Incident ReportsIR
IR-2026-005
MED

C2 Incident — Revoked AnyDesk Certificate (17 Endpoints)

FILED:Feb 2026
TAXONOMY:T1553.002
Complexity:High
7h containment
~5m read
TRUE POSITIVE — CERTIFICATE HYGIENE FAILURE, ADVISORY ISSUED

Isolated Defender for Endpoint alerts occurring at varying times prompted a proactive network-wide hunt, uncovering 17 managed endpoints running AnyDesk v7.0.0 — signed with a certificate revoked in AnyDesk's January 2024 infrastructure incident. A non-standard process name (AnyDesk-f45eSaf2.exe) required investigation to confirm legitimate vendor provenance. No external C2 connections observed. Advisory issued to update all 17 installations.

C2EndpointDefenderCertificateAnyDesk
Outcome
Defender blocked process execution — no active remote sessions disrupted
No external C2 connections observed across any of the 17 endpoints
Advisory issued — certificate hygiene remediation in progress via centralised deployment
Detection Gap
AnyDesk certificate revoked January 2024 — unpatched for 13+ months across 17 endpoints
Background & Context

In January 2024, AnyDesk GmbH disclosed a compromise of their production systems and revoked all existing code-signing certificates as part of their incident response. All versions of AnyDesk signed before this date — including v7.0.0 — now carry a revoked certificate. Microsoft Defender for Endpoint classifies executables with revoked certificates as untrusted, and AnyDesk's persistent relay connection behaviour (which is structurally similar to C2 communication) causes the alert classification to surface as "C2 behaviour blocked."

This was a widely publicised incident in the security community in Q1 2024. The client's failure to update across 17 managed endpoints indicates either a gap in software update management processes or an oversight in applying the vendor's remediation advisory — a systemic certificate hygiene failure rather than a malware incident.

The non-standard process name (AnyDesk-f45eSaf2.exe) introduced an additional analytical layer. RATs and remote access malware are frequently renamed to evade process-name-based detection rules. This name deviation could not be dismissed without verification — file metadata analysis was required to establish legitimate vendor provenance before the investigation could be scoped as a hygiene issue rather than a genuine malware incident.

Triage Thought Process
01Isolated alerts over time require proactive hunting. Rather than dismissing individual alerts as noise, a network-wide KQL query revealed 17 separate endpoints executing the exact same binary — confirming a systemic issue.
02Non-standard exe name (AnyDesk-f45eSaf2.exe) requires investigation before dismissal. RATs are frequently renamed to evade process-name-based detection — cannot be dismissed without file metadata verification.
03File metadata check is the critical step. Pull FileVersion and CompanyName metadata. Consistent 'AnyDesk Software GmbH' across 17 endpoints provides strong legitimate provenance.
04Understand why this was flagged as C2. This is a revoked certificate detection, not a hash-based malware detection. AnyDesk's relay connection behaviour structurally mimics C2, and the revoked certificate removes the trust basis for exemption.
05Confirm no external connections were made. If Defender blocked the process before relay connections established, there is no C2 communication to investigate.
06Filename exclusions are never the answer. Any post-update exclusion must be scoped to the specific updated hash — filename-based exclusions are trivially bypassed.
Decision
Certificate hygiene failure at scale — not a malware incident. Advisory issued. Remediation is update via the same centralised RMM deployment mechanism that distributed the outdated version.
Incident Timeline
17 Feb, ~09:00
Isolated Defender alerts: C2 behaviour blocked (AnyDesk-f45eSaf2.exe) — network-wide KQL hunt reveals 17 total endpoints
17 Feb, ~09:05
Analyst begins triage — 17 affected endpoints identified across client estate
17 Feb, ~09:10
File hash submitted to VirusTotal and Recorded Future — RF Score: Indeterminate
17 Feb, ~09:20
File version metadata reviewed: AnyDesk Software GmbH provenance confirmed, v7.0.14
17 Feb, ~09:25
Certificate status verified: revoked — AnyDesk January 2024 infrastructure incident
17 Feb, ~09:30
Non-standard process name 'AnyDesk-f45eSaf2.exe' investigated — confirmed as custom RMM deployment naming convention
17 Feb, ~09:35
Network connections reviewed: internal LAN only — no external C2 connections
17 Feb, ~09:40
No lateral movement, credential access, or data exfiltration across all endpoints
17 Feb, ~09:45
AnyDesk v7.0.0 confirmed: uses revoked certificate from Jan 2024 incident
17 Feb, ~10:00
Advisory issued to client: update AnyDesk to latest version on all 17 endpoints
17 Feb, ~16:00
Ticket closed — advisory issued, no compromise confirmed
Technical Analysis

A network-wide KQL hunt on the process name returned 17 distinct endpoints executing the same binary. File version metadata pulled from all 17 confirmed consistent "AnyDesk Software GmbH" as the CompanyName and "7.0.14" as the FileVersion — providing strong evidence of legitimate vendor provenance across the entire affected fleet. The custom naming convention (AnyDesk-f45eSaf2.exe) was subsequently confirmed as originating from the client's RMM deployment tool, which appends a unique identifier to managed software deployments.

Certificate verification confirmed the signing certificate was issued to AnyDesk Software GmbH and was revoked during their January 2024 infrastructure incident. The certificate serial number and revocation date are documented in AnyDesk's public disclosure. The version in use (v7.0.0, build 7.0.14, signed 2023-09-25) predates the certificate rotation — meaning every installation of this version on any endpoint will generate the same Defender alert.

Network connection review across all 17 endpoints confirmed exclusively internal LAN traffic — no external connections to AnyDesk relay infrastructure were observed. This indicates the application was installed but not actively being used for remote sessions at the time of detection. Defender blocked the process before any relay connections could be established.

The detection pattern — isolated alerts appearing at varying times across the estate — is explained by the fact that Defender performs certificate validation checks asynchronously and not always at the same point in the process lifecycle. The alerts were not correlated by the SIEM before the analyst's proactive hunt connected them as a single systemic issue.

Environment
Microsoft Defender for Endpoint
Windows / Microsoft Sentinel
VirusTotal, Recorded Future (hash and cert enrichment)
Signals
Isolated Defender alerts at varying times: C2 behaviour blocked — AnyDesk-f45eSaf2.exe
Non-standard process name — not the standard AnyDesk.exe binary name
Code-signing certificate: AnyDesk Software GmbH — revoked January 2024
AnyDesk v7.0.0 — pre-certificate-rotation version
Network-wide KQL hunt reveals 17 endpoints with identical binary
What I Checked
File hash submitted to VirusTotal and Recorded Future — RF Score: Indeterminate
File version metadata reviewed: AnyDesk Software GmbH provenance confirmed across all 17 endpoints
Certificate status verified: revoked during AnyDesk January 2024 infrastructure incident
Non-standard process name investigated — confirmed as custom RMM deployment naming convention
Network connections reviewed: internal LAN only — no external C2 connections confirmed
No lateral movement, credential access, or data exfiltration across any endpoint
Centralised RMM deployment confirmed — systemic version issue, not individual user installs
Actions Taken
Advisory issued to client IT: update AnyDesk to latest version on all 17 endpoints via centralised deployment
Non-standard exe naming convention flagged to client IT — document for future triage context
Confirmed: any future exclusion must be scoped to the updated hash, never a filename exclusion
Recommended evaluation of Microsoft-native remote access alternatives
Indicators of Compromise
TypeIndicatorNotes
FileAnyDesk-f45eSaf2.exeNon-standard process name — confirmed legitimate vendor binary via file metadata
VersionAnyDesk v7.0.0 (build 7.0.14)Signed 2023-09-25 — certificate subsequently revoked January 2024
CertificateAnyDesk Software GmbH (revoked)Revoked following AnyDesk infrastructure incident, January 2024
File Hash1667221e86d40770dcf[REDACTED]35fb8aaaee3dcb8RF Score: Indeterminate — detection is certificate-based, not hash-based
NetworkInternal LAN onlyNo external C2 connections — application not in active remote use at time of scan
Scale17 endpoints affectedCentralised RMM deployment — systemic version issue, not individual installs
MITRE ATT&CK Mapping
TacticTechniqueIDObserved
Defense EvasionSubvert Trust Controls: Code SigningT1553.002Revoked certificate — Defender classifies binary as untrusted executable
Command & ControlRemote Access SoftwareT1219AnyDesk classified as RAT-category tool — blocked due to revoked certificate posture
Initial Access (Theoretical)External Remote ServicesT1133AnyDesk could enable persistent external remote access — policy risk if unmanaged or outdated
Detection Logic (KQL)
// Identify all 17 affected endpoints and confirm file metadata
DeviceFileEvents
| where FileName == "AnyDesk-f45eSaf2.exe"
| summarize Devices=make_set(DeviceName), Count=count() by SHA1, FolderPath
| order by Count desc

// Verify no external connections from the blocked process
DeviceNetworkEvents
| where InitiatingProcessFileName == "AnyDesk-f45eSaf2.exe"
| where RemoteIPType != "Private"
| project Timestamp, DeviceName, RemoteIP, RemotePort, RemoteUrl

// Confirm C2 block events across all endpoints
DeviceEvents
| where ActionType == "AntivirusDetection"
| where FileName == "AnyDesk-f45eSaf2.exe"
| summarize count() by DeviceName, ActionType, ThreatName

// Confirm file metadata and certificate provenance
DeviceFileCertificateInfo
| where FileName == "AnyDesk-f45eSaf2.exe"
| project DeviceName, FileName, Signer, IsTrusted, CertificateExpirationTime, CertificateSerialNumber
Analyst NotesMuhammad Fezzan

Classic certificate hygiene failure at scale. The AnyDesk January 2024 incident was widely publicised — this should have triggered an update across the estate in Q1 2024. 13+ months of exposure to a known revoked certificate is the primary finding here.

The non-standard exe name (AnyDesk-f45eSaf2.exe) was the most analytically interesting element — metadata verification was the correct step before any dismissal of the anomalous name.

Tuning candidate: if the client confirms the naming convention originates from their RMM tool, a detection exclusion scoped to the updated, valid hash can prevent repeat alerts post-update. Filename-based exclusions are never appropriate.

Lessons Learned
Software certificate lifecycle management is a security obligation — AnyDesk's revocation was widely publicised and should have triggered an immediate update.
Centralised deployments propagate outdated software at scale — the same mechanism that creates the problem should remediate it.
File metadata verification is the critical step for non-standard process names before dismissal.
Filename-based detection exclusions are never appropriate — always scope to specific updated hashes.
Implement a software security advisory monitoring process for all deployed third-party tools.
Recommendations
R1Implement a software security advisory monitoring process: subscribe to vendor security advisories for all third-party tools deployed across the estate. AnyDesk's January 2024 disclosure should have triggered an immediate update cycle — 13+ months of exposure is not acceptable.
R2Establish a certificate hygiene review cadence: periodically audit code-signing certificates on deployed software against known revocation lists, particularly for remote access tools which represent elevated risk.
R3Filename-based detection exclusions must never be used: any post-update tuning must be scoped to the specific hash of the updated, valid binary — never a filename. Document this as a standing policy.
R4Evaluate native alternatives for remote access: AnyDesk and similar third-party remote access tools represent an ongoing attack surface. Microsoft's native remote access capabilities (Windows App, Quick Assist with Entra authentication) may reduce third-party tool exposure.
SIG
Case Certification
Muhammad Fezzan
SOC ANALYST
DIGITAL TIMESTAMP
FEB 2026 // REG-005-FS
← All incidentsCase anonymised