Re: How To Update Anydesk In Windows 10

0 views
Skip to first unread message
Message has been deleted

Leana Eckes

unread,
Jul 7, 2024, 7:25:57 AM7/7/24
to bandduterna

are you using a Windows 11 VM hosted by Hyper-V? If so check if there is a session of anyone connected to the machine using Hyper-V. You should change the session option to basic session instead of enhanced session. This will help you connect with any desk. You have two ways of doing this:

how to update anydesk in windows 10


Descargar Zip https://shurll.com/2yOVx5



I understood your problem and I just remembered it happen the same to me once but using a W10. I had several physical machines connected to the same firewall with same W10 version installed in all of them but for some reason in one of the machines anydesk wouldn't connect to the network. I didn't manage to fix that because I didn't really need it.

But I might have some thoughts about the trouble, if you ensure your network works properly (as you mentioned W10 machine works, I assume your network is fine too), then you should check that Windows Defender Firewall has the following entry rules:

I installed AnyDesk and configured it to start as a service. By doing so, an invisible window remains active, blocking the buttons on the top bar of windows, preventing me from clicking and closing maximized windows. How can I resolve this?

I have a seemingly bizarre situation. When I click the windows decorations in the upper right corner of the window (the maximize / minimize / close icons), then either it does nothing, or it launches an unrelated program. And what is stranger, is that this only occurs if the icons are in an area about 1" x 1" in the right upper corner of the desktop.

I have tested by taking various applications and positioning the top right corner step by step. Outside this zone, everything works fine. Inside the zone is malfunctions. I tried changing the launcher dock from the left side of the screen to the right, but this just shifts the zone out enough to accommodate the dock. I have a 2nd screen, and I tried moving its positioning around, and it seemed to have no effect.

I have set this computer up for my wife, who is a Linux skeptic, and she loves to run her programs in full screen mode. Unfortunately, this always puts the close button in the zone, and she is not amused when she tries to close, for example, Firefox -- only to have AnyDesk launch.

UPDATE:As I was writing this post, StackExchange was busy trying to find similar posts. If found this one: Anydesk freezes (clicking not working) a portion of right side upper corner in ubuntu 23.04 And that seems to describe my same problem. I don't want to lose everything I have written up, so I will post this, but I am also going to try the suggestions posted there.

I am trying to use Anydesk for remote connections. I have allow the .exe to the inbound firewall, but it show connection error.
At anydesk site, i have found that i have to allow *.net.anydesk.com for inbound.

Detects AnyDesk writing binary files to disk other than "gcapi.dll". According to RedCanary research it is highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll, which is a legitimate DLL that is part of the Google Chrome web browser used to interact with the Google Cloud API. (See reference section for more details) . This rule is adapted from _event/file_event_win_anydesk_writing_susp_binaries.yml

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment.

[German]I've been working on the "suspected case" of the AnyDesk hack since a week, which was confirmed as a "successful cyberattack" on Friday, February 2, 2024. At the weekend, I wrote up my findings in four articles (see links at the end of the article). I would now like to add a few more thoughts and tips for readers as a kind of follow-up.

The screenshot above shows the AnyDesk incidence report again. I have prepared further information in other parts (see links at the end of the article). Below are some comments and information for my blog readership.

I can understand that there was turmoil at AnyDesk, and great consideration is given to how and when the public is informed. But as of February 1, 2024, there was an offer from me to talk with the CEO about the incident, which did not happen all day on Friday, February 2, 2024. Okay, I'm not "the center of the world" and they have no obligation to talk to me at all and in a timely manner.

Security researcher Jake Williams picked up on it in the above tweet in his "Remarks on the AnyDesk incident". Original quote: This shouldn't be published on a Friday afternoon when the systems were taken offline days ago. This is a PR move. Companies that are transparent don't do this kind of nonsense.

This leaves a lot of uncertainty for those affected and speculation for observers. Excerpt from AnyDesk's privacy policy: "The success of our products depends not least on our customers being able to trust in the security and protection of their data." That is a message and a promise.

Even if presumably no customer data was leaked when accessing the production systems at AnyDesk, i.e. no customer information is required by GDPR, this is anything but "good practice". At the time of writing this article, there is no indication on the AnyDesk website or on their cyber incident status page for visitors. You need to know the deep link to the report to be informed about the incident.

Then, in the sequence of tweets shown above, he makes various recommendations to those responsible for AnyDesk as well as to every user of AnyDesk (although many do not know that they are users because AnyDesk comes in some software packages on the systems. Williams' outlined recommendations in the above tweet.

The case can be reduced to the headline above. Nobody knows exactly where to look and how far back in time to look at logs. At the moment, I can only see the following immediate measures for administrators and users:

What administrators should definitely do in my opinion, however, would be to search their systems for anydesk*.exe to determine whether any versions of the AnyDesk client have been included, possibly as part of an installed software.

Once it has been clarified that the AnyDesk client is present on endpoints and which version it has, the decision is made as to whether a possible compromise could have taken place and whether an update is possible. In the case of an update, it is necessary to clarify which update options are available, whether the new version of the client is accepted by the endpoint security (some virus scanners already block the clients) and whether the new AnyDesk client version is still "trustable".

On the one hand, there currently seem to be technical problems with the update (mass of requests, certain things not working with custom clients, see the other parts of the article series). In addition, I received a number of messages from administrators over the weekend completely blocking the client from running for security reasons.

When performing incident response, the adversary often uses legitimate remote access software as an interactive command and control channel.AnyDesk1 is one of those software being extensively used as a sublayer of persistence by threat actors or access other servers in the environment via RDP2.
The latter has been often encountered in the wild in the past years as a preferred tool leveraged by known threat actors.

As such, Anydesk should be closely monitored as threat actors could easily alter or delete data after a successful attack; sometimes it is not possible to restore those altered logs. Defending against malicious actions with such remote software can be even more intricate for organizations having approved its legitimate usage.Here we propose to leverage memory forensics to retrieve and analyze artefacts thanks to a custom Volatility plugin that I made available as a free open-source tool for improving digital investigations.

In this blog post, we will cover which files linked to anydesk are useful and how valuable it can be upon an investigation. Eventually, in the case where an intrusion set is deleting those files using an anti-forensics technique, a volatility3 plugin will be proposed to retrieve that information, which might still reside in memory.

This plugin was tested on Windows 10 memory dumps and the code can be found on the forensicxlab github : _plugins.I would like to thank @DebugPrivilege for the tweet6 he made about the subject that gave me the idea to write this plugin.

It will be submitted to the volatility3 foundation for integration to the framework. You should Identify each steps described before in the source code comments.Do not hesitate to reach me at felix....@forensicxlab.com, or to make a pull-request on the repository to enhance this plugin or this article.

d3342ee215
Reply all
Reply to author
Forward
0 new messages