Remote Access Tool - AnyDesk Execution With Known Revoked Signing Certificate

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the execution of an AnyDesk binary with a version prior to 8.0.8. Prior to version 8.0.8, the Anydesk application used a signing certificate that got compromised by threat actors. Use this rule to detect instances of older versions of Anydesk using the compromised certificate This is recommended in order to avoid attackers leveraging the certificate and signing their binaries to bypass detections.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND ((PROCESSNAME endswith "\AnyDesk.exe" OR MESSAGE = "AnyDesk" OR PRODUCT_NAME = "AnyDesk" OR COMPANY_NAME = "AnyDesk Software GmbH") AND VERSION startswith "7.0.,7.1.,8.0.1,8.0.2,8.0.3,8.0.4,8.0.5,8.0.6,8.0.7") AND COMMANDLINE notcontains " --remove, --uninstall" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Sai Prashanth Pulisetti, Nasreddine Bencherchali (Nextron Systems)