Newsletter

AnyDesk was attacked by a network and the source code of the program was suspected to be leaked|Users should do something immediately to ensure safety

AnyDesk was attacked by a network and the source code of the program was suspected to be leaked|AnyDesk, a remote control software used by many Hong Kong people, has recently been reported to have been hacked, causing concern among users. According to foreign reports, AnyDesk’s program source code and signature certificate may have been stolen in this intrusion. In response to this threat, AnyDesk announced that it has taken a series of remedial measures.

AnyDesk did not disclose the details of the intrusion process. It only stated that after detecting anomalies and conducting a security audit, it found signs of unauthorized access to the production system. The company immediately launched an emergency plan, worked with security agencies to conduct system testing and repairs, and stated that security patches had been completed. To prevent further security breaches, AnyDesk has taken multiple remedial measures: including revoking all security-related certificates, replacing affected parts of the system, and re-issuing code signing certificates. The company said it found no evidence that user devices were affected, but still recommended that users update to the latest secure version.

The server of AnyDesk, a free remote control software used by many Hong Kong people, is suspected to have been hacked.

Although AnyDesk denied that the source code was leaked, security experts pointed out that considering the fact that the signature certificate was leaked, there is a possibility that the program source code was also illegally obtained. This incident attracted widespread attention and prompted AnyDesk users to worry about the security of their personal information and devices.

Experts remind users to update the AnyDesk software as soon as possible and change passwords in the future and not use the same password for other services, and pay close attention to subsequent security announcements. At the same time, we strengthen the security protection of accounts and devices, and also strive to protect personal data.

source:Bleeping Computer