Remote Access Tools: Remote Desktop Software

An adversary may use legitimate desktop support software to establish an interactive command and control channel to target systems within networks. Desktop support software provides a graphical interface for remotely controlling another computer, transmitting the display output, keyboard input, and mouse control between devices using various protocols. Desktop support software, such as VNC, Team Viewer, AnyDesk, ScreenConnect, LogMein, AmmyyAdmin, and other remote monitoring and management (RMM) tools, are commonly used as legitimate technical support software and may be allowed by application control within a target environment.[1][2][3]

Remote access modules/features may also exist as part of otherwise existing software such as Zoom or Google Chrome’s Remote Desktop.[4][5]

ID: T1219.002
Sub-technique of:  T1219
Platforms: Linux, Windows, macOS
Version: 1.0
Created: 24 March 2025
Last Modified: 16 April 2025

Procedure Examples

ID Name Description
C0015 C0015

During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.[6]

C0018 C0018

During C0018, the threat actors used AnyDesk to transfer tools between systems.[7][8]

G0120 Evilnum

EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromised machines.[9]

G0094 Kimsuky

Kimsuky has used a modified TeamViewer client as a command and control channel.[10][11]

G0129 Mustang Panda

Mustang Panda has installed TeamViewer on targeted systems.[12]

G0048 RTM

RTM has used a modified version of TeamViewer and Remote Utilities for remote access.[13]

G1046 Storm-1811

Storm-1811 has abused multiple types of legitimate remote access software and tools, such as ScreenConnect, NetSupport Manager, and AnyDesk.[14][15]

G0076 Thrip

Thrip used a cloud-based remote access software called LogMeIn for their attacks.[16]

Mitigations

ID Mitigation Description
M1042 Disable or Remove Feature or Program

Consider disabling unnecessary remote connection functionality, including both unapproved software installations and specific features built into supported applications.

M1038 Execution Prevention

Use application control to mitigate installation and use of unapproved software that can be used for remote access.

M1037 Filter Network Traffic

Properly configure firewalls, application firewalls, and proxies to limit outgoing traffic to sites and services used by remote access software.

Detection

ID Data Source Data Component Detects
DS0029 Network Traffic Network Connection Creation

Monitor for Outbound connections to known RMM service endpoints (e.g., .teamviewer.com, .anydesk.com)New connections from internal systems to unexpected IPs on:TCP 5938 (TeamViewer)TCP 7070–7071 (AnyDesk)TCP 5650 (Ammyy Admin)TCP/UDP 443, 80, or randomized ports

Analytic 1 - Detect network traffic for Remote Desktop software

sourcetype=WinEventLog:Microsoft-Windows-Sysmon/Operational EventCode=3(DestinationHostname IN (".teamviewer.com", ".anydesk.com", ".logmein.com", ".screenconnect.com"))OR (DestinationPort IN (5938, 7070, 7071, 443) AND Image="*")| stats count by Image, DestinationIp, DestinationPort, CommandLine, host, _time| sort -_time

Network Traffic Content

Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g. extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)).

DS0009 Process Process Creation

Monitor for applications and processes related to remote desktop software. Correlate activity with other suspicious behavior that may reduce false positives if this type of software is used by legitimate users and administrators. Domain Fronting may be used in conjunction to avoid defenses. Adversaries will likely need to deploy and/or install these remote software to compromised systems. It may be possible to detect or prevent the installation of this type of software with host-based solutions.

Analytic 1 - Detect Remote Desktop Execution

sourcetype=WinEventLog:Microsoft-Windows-Sysmon/Operational(Image="\TeamViewer.exe" OR Image="\AnyDesk.exe" OR Image="\Ammyy_Admin.exe" OR Image="\connectwisecontrol.client.exe")| stats count by Image, ParentImage, CommandLine, user, host, _time| sort -_time

References