| ID | Name |
|---|---|
| T1219.001 | IDE Tunneling |
| T1219.002 | Remote Desktop Software |
| T1219.003 | Remote Access Hardware |
An adversary may use legitimate desktop support software to establish an interactive command and control channel to target systems within networks. Desktop support software provides a graphical interface for remotely controlling another computer, transmitting the display output, keyboard input, and mouse control between devices using various protocols. Desktop support software, such as VNC, Team Viewer, AnyDesk, ScreenConnect, LogMein, AmmyyAdmin, and other remote monitoring and management (RMM) tools, are commonly used as legitimate technical support software and may be allowed by application control within a target environment.[1][2][3]
Remote access modules/features may also exist as part of otherwise existing software such as Zoom or Google Chrome’s Remote Desktop.[4][5]
| ID | Name | Description |
|---|---|---|
| C0015 | C0015 |
During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.[6] |
| C0018 | C0018 |
During C0018, the threat actors used AnyDesk to transfer tools between systems.[7][8] |
| C0027 | C0027 |
During C0027, Scattered Spider directed victims to run remote monitoring and management (RMM) tools.[9] |
| G1052 | Contagious Interview |
Contagious Interview has downloaded remote management and monitoring software such as "AnyDesk" for post compromise activities.[10][11][12][13][14] |
| G0120 | Evilnum |
EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromised machines.[15] |
| G0094 | Kimsuky |
Kimsuky has used a modified TeamViewer client as a command and control channel.[16][17] |
| G0129 | Mustang Panda |
Mustang Panda has installed TeamViewer on targeted systems.[18] |
| G0048 | RTM |
RTM has used a modified version of TeamViewer and Remote Utilities for remote access.[19] |
| G1015 | Scattered Spider |
In addition to directing victims to run remote software, Scattered Spider members themselves also deploy RMM software including TeamViewer, AnyDesk, LogMeIn, ngrok, and ConnectWise to establish persistence on the compromised network.[20][21][22][23][24] |
| G1053 | Storm-0501 |
Storm-0501 has used legitimate remote monitoring and management (RMM) tools including AnyDesk, NinjaOne, and Level.io.[25] |
| G1046 | Storm-1811 |
Storm-1811 has abused multiple types of legitimate remote access software and tools, such as ScreenConnect, NetSupport Manager, and AnyDesk.[26][27] |
| G0076 | Thrip |
Thrip used a cloud-based remote access software called LogMeIn for their attacks.[28] |
| ID | Mitigation | Description |
|---|---|---|
| M1042 | Disable or Remove Feature or Program |
Consider disabling unnecessary remote connection functionality, including both unapproved software installations and specific features built into supported applications. |
| M1038 | Execution Prevention |
Use application control to mitigate installation and use of unapproved software that can be used for remote access. |
| M1037 | Filter Network Traffic |
Properly configure firewalls, application firewalls, and proxies to limit outgoing traffic to sites and services used by remote access software. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0259 | Remote Desktop Software Execution and Beaconing Detection | AN0714 |
Adversary installation or use of RMM software (e.g., TeamViewer, AnyDesk, ScreenConnect) followed by outbound beaconing or remote session establishment |
| AN0715 |
Execution of known or custom VNC/remote desktop daemons or tunneling agents that initiate external communication after launch |
||
| AN0716 |
Initiation of remote desktop sessions via AnyDesk, TeamViewer, or Chrome Remote Desktop accompanied by unexpected user logins or system modifications |