{"id":65633,"date":"2025-05-07T14:09:52","date_gmt":"2025-05-07T14:09:52","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=65633"},"modified":"2026-04-13T10:44:58","modified_gmt":"2026-04-13T09:44:58","slug":"anydesk-security-breach-2","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/","title":{"rendered":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access"},"content":{"rendered":"<p data-pm-slice=\"1 1 []\">The AnyDesk security breach is a reminder of why secure remote access matters. After a routine audit, AnyDesk discovered its production systems had been compromised, which proves that some remote access tools lack security at their core.<\/p>\n<h2>Key Details of the AnyDesk Breach<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/img.freepik.com\/free-photo\/security-breach-hacker-cyber-crime-privacy-policy-concept_53876-120331.jpg\" \/><\/p>\n<h3>An Internal Audit Revealed a Serious Security Incident<\/h3>\n<p>According to an\u00a0<a class=\"css-1rn59kg\" href=\"https:\/\/anydesk.com\/en\/public-statement\" target=\"_blank\" rel=\"noopener noreferrer\">incident response by AnyDesk<\/a>, a security audit found that some of the company\u2019s systems had been compromised. While the incident wasn&#8217;t related to ransomware, attackers used the breach to gain unauthorized access to sensitive information on AnyDesk&#8217;s systems.<\/p>\n<p>AnyDesk has downplayed the incident, claiming that the situation was under control. However, users were urged to reset their passwords if they had installed AnyDesk on their systems and used the same credentials elsewhere. The timing of maintenance in the days before the public announcement, as well as the late Friday afternoon press release from AnyDesk, indicates that the breach occurred several days before they publicly acknowledged it.<\/p>\n<h3>Bad Actors Stole Source Code and Signing Certificates<\/h3>\n<p><a class=\"css-1rn59kg\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/anydesk-says-hackers-breached-its-production-servers-reset-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">BleepingComputer<\/a> discovered that the attackers stole source code and private code signing keys, which were later used to push malware under the guise of trusted software.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.surferseo.art\/302c179b-8b86-4e41-909d-399b1bcb0746.jpeg\" \/><\/p>\n<h3>Attackers Used the Certificate to Spread Malware<\/h3>\n<p>With the stolen certificate, cybercriminals signed and distributed more than <a href=\"https:\/\/www.cybereason.com\/blog\/threat-alert-the-anydesk-breach-aftermath\" target=\"_blank\" rel=\"noopener noreferrer\">500 samples of Agent Tesla<\/a>, which is a well-known remote access trojan (RAT). These files appeared authentic, making it easier for them to slip past defenses and infect devices.<\/p>\n<h3>18,000+ Customer Credentials Leaked<\/h3>\n<p><a href=\"https:\/\/www.resecurity.com\/blog\/article\/following-the-anydesk-incident-customer-credentials-leaked-and-published-for-sale-on-the-dark-web\" target=\"_blank\" rel=\"noopener noreferrer\">Resecurity reported<\/a> that over 18,000 AnyDesk user credentials surfaced on the dark web.<\/p>\n<p>Organizations must be aware of the risks associated with remote access software and take proactive measures to secure their systems and data. This includes monitoring for any signs of malicious activity and ensuring that all security protocols are up to date.<\/p>\n<p>In response, AnyDesk issued a new code signing certificate and urged users to change their passwords, especially if they\u2019d used the same credentials elsewhere.<\/p>\n<h3>An Additional Security Flaw Discovered<\/h3>\n<p>As if the breach itself wasn\u2019t enough, a critical vulnerability identified as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-13753\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2024-13754<\/a> was disclosed in AnyDesk&#8217;s handling of desktop background images. This flaw allows local attackers with low-privileged <a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-24-1711\/\" target=\"_blank\" rel=\"noopener noreferrer\">access to escalate their privileges<\/a> by exploiting the way AnyDesk processes background images during session initialization.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.surferseo.art\/18b75236-881a-4ecf-8c5c-849e72cb4f3f.png\" alt=\"\" \/><\/p>\n<p>A <a href=\"https:\/\/digital.nhs.uk\/cyber-alerts\/2025\/cc-4615\" target=\"_blank\" rel=\"noopener noreferrer\">proof-of-concept exploit<\/a> was released in early 2025, increasing the urgency for users to update to the latest version to mitigate potential risks.<\/p>\n<h3>Attackers Impersonated CERT-UA in a Social Engineering Campaign<\/h3>\n<p>In early 2025, attackers began impersonating Ukraine&#8217;s Computer Emergency Response Team (CERT-UA) by sending fraudulent AnyDesk connection requests under the guise of conducting security audits. These social engineering attacks aimed to trick users into granting remote access, potentially leading to unauthorized data access or system compromise.<\/p>\n<p>CERT-UA has clarified that while it may use remote access tools like AnyDesk, such actions are only taken after prior agreement through official communication channels.<\/p>\n<h2>How AnyDesk Responded to the Breach<\/h2>\n<p>Following the breach, AnyDesk <a href=\"https:\/\/news.trendmicro.com\/2024\/02\/10\/anydesk-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">took several measures<\/a> to secure its systems and protect users. The company revoked all security-related certificates, including code-signing certificates, and replaced them with new ones.<\/p>\n<p>Additionally, AnyDesk invalidated all passwords to its customer web portal and urged users to reset their passwords, especially if the same credentials were used elsewhere. These actions were part of a comprehensive incident response plan to mitigate the breach&#8217;s impact.<\/p>\n<h2>Why Should You Take the AnyDesk Attack Seriously?<\/h2>\n<p>If you\u2019re an AnyDesk user, you should take this news very seriously. And even if you\u2019re using another remote access solution, this needs to make you challenge its security credentials.<\/p>\n<p>Unfortunately, this is not the first time that something like this has happened. As we said at the time of <a href=\"https:\/\/www.realvnc.com\/en\/blog\/what-recent-goto-security-incident-says-remote-access-software-industry\/?lai_vid=EWwg99E0dTNvM&amp;lai_sr=35-39&amp;lai_sl=m&amp;lai_p=1\" target=\"_blank\" rel=\"noopener noreferrer\">the GoTo security incident<\/a>, when security is not the first priority, customers are the ones who end up suffering.<\/p>\n<h2>RealVNC&#8217;s commitment to security<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/09\/laptop-desktop-min-1024x490.png\" alt=\"\" \/><\/p>\n<p>At RealVNC, security isn\u2019t a feature; it\u2019s the foundation. Every connection, every update, every line of code is built around <a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\" target=\"_blank\" rel=\"noopener noreferrer\">keeping your data protected<\/a>.<\/p>\n<h3>ISO 27001 Certification is More Than Just a Badge<\/h3>\n<p>We\u2019re <a href=\"https:\/\/www.realvnc.com\/en\/blog\/realvnc-iso27001-certification-what-it-is-why-it-matters\" target=\"_blank\" rel=\"noopener noreferrer\">ISO 27001 certified<\/a>, which means we follow one of the most rigorous global standards for information security. That includes continuous risk assessments, company-wide controls, independent audits, and regular training for our team.<\/p>\n<p>In short, it\u2019s proof that we don\u2019t just react to threats. We plan for them. If your remote access provider isn\u2019t certified, ask why.<\/p>\n<h3>Built for Zero Trust<\/h3>\n<p>Our software is designed to be secure even if you don\u2019t trust us.<\/p>\n<ul>\n<li>No stored sessions. No decryptable data.<\/li>\n<li>Every connection is treated like it\u2019s under attack.<\/li>\n<li>Access is always controlled by the person at the remote machine.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2024\/08\/security-principles.png\" \/><\/p>\n<p>Even if someone stole your portal credentials, they\u2019d still need a second set (like Active Directory) to access a device. We don\u2019t store those. We don\u2019t even store portal passwords in plaintext. Yes, it adds a small amount of friction. But it\u2019s friction that protects you and provides a secure environment.<\/p>\n<h3>Third-party Audited, Customer Trusted<\/h3>\n<p>We also commissioned a full <a href=\"https:\/\/www.realvnc.com\/en\/blog\/cure53-security-audit-reaffirms-realvnc-strong-security-stance\" target=\"_blank\" rel=\"noopener noreferrer\">white-box security audit from Cure53<\/a>, a respected independent firm. Their assessment confirmed our strong security posture across the board. When vendors skip this kind of testing, end users are the ones who suffer.<\/p>\n<h2>Your Data is in Safe Hands with RealVNC<\/h2>\n<p>RealVNC has never experienced a data breach. And we\u2019re working hard to keep it that way.<\/p>\n<p>This is what RealVNC CEO Adam Greenwood-Byrne had to say:<\/p>\n<blockquote><p><em>I\u2019m proud of RealVNC\u2019s unblemished security record, and we continue to invest in systems and services that ensure we remain on the strongest footing. Customers who have been with us for years, including government departments around the world, recognise the value of our security stance just as well as we recognise the trust they place in us as their remote access vendor of choice.\u00a0<\/em><\/p>\n<p><em>We value those relationships tremendously at RealVNC and our team works tirelessly to ensure our customers have what they need to feel safe. The Internet is a much more dangerous place than it was 20 years ago and we are committed to evolving and adapting accordingly.<\/em><\/p><\/blockquote>\n<h2>What Should You Do Next?<\/h2>\n<p>Start by asking if your remote access provider can prove that it\u2019s secure. But don&#8217;t just take them at their word. Look for hard evidence like independent audits, ISO 27001 certification, and an architecture that doesn\u2019t rely on trust alone. If your current provider can\u2019t offer that, it might be time to move on.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/images.surferseo.art\/34348874-8025-49a8-a619-c02afb1fbca4.png\" \/><\/p>\n<p><a href=\"https:\/\/www.realvnc.com\/en\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">RealVNC Connect<\/a> is designed for teams that need secure, flexible remote access without the risk. It brings the Viewer and Server together into one simple app, works across Windows, Mac, Linux, and mobile, and includes features like file transfer, multi-monitor support, in-session chat, and an easy-to-use interface.<\/p>\n<p>It\u2019s not just about usability. It\u2019s about control.<\/p>\n<p>RealVNC uses self-expiring session codes and never stores session data or decryptable credentials. You control who connects, when, and how. And with <a target=\"_blank\" rel=\"noopener noreferrer\">Code Connect<\/a>, you can set up invite-only access and always know who\u2019s on the other end.<\/p>\n<p>Want remote access that\u2019s actually secure? <a href=\"https:\/\/www.realvnc.com\/en\/connect\/download\" target=\"_blank\" rel=\"noopener noreferrer\">Try RealVNC Connect<\/a>. It&#8217;s trusted by IT leaders, government teams, and security-conscious organizations around the world. Start your free trial today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The AnyDesk security breach is a reminder of why secure remote access matters. After a routine audit, AnyDesk discovered its production systems had been compromised, which proves that some remote access tools lack security at their core. Key Details of the AnyDesk Breach An Internal Audit Revealed a Serious Security Incident According to an\u00a0incident response &#8230; <a title=\"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/\" aria-label=\"Read more about The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\">Read more<\/a><\/p>\n","protected":false},"author":16,"featured_media":65720,"template":"","blog_category":[],"class_list":["post-65633","blog","type-blog","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\" \/>\n<meta property=\"og:description\" content=\"The AnyDesk security breach is a reminder of why secure remote access matters. After a routine audit, AnyDesk discovered its production systems had been compromised, which proves that some remote access tools lack security at their core. Key Details of the AnyDesk Breach An Internal Audit Revealed a Serious Security Incident According to an\u00a0incident response ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/\"},\"author\":{\"name\":\"Bogdan Bele\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\"},\"headline\":\"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\",\"datePublished\":\"2025-05-07T14:09:52+00:00\",\"dateModified\":\"2026-04-13T09:44:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/\"},\"wordCount\":1221,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/\",\"name\":\"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg\",\"datePublished\":\"2025-05-07T14:09:52+00:00\",\"dateModified\":\"2026-04-13T09:44:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg\",\"width\":730,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/anydesk-security-breach-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\",\"name\":\"Bogdan Bele\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"caption\":\"Bogdan Bele\"},\"description\":\"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bogdanbele\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/","og_locale":"en_US","og_type":"article","og_title":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access","og_description":"The AnyDesk security breach is a reminder of why secure remote access matters. After a routine audit, AnyDesk discovered its production systems had been compromised, which proves that some remote access tools lack security at their core. Key Details of the AnyDesk Breach An Internal Audit Revealed a Serious Security Incident According to an\u00a0incident response ... Read more","og_url":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:58+00:00","og_image":[{"width":730,"height":300,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/"},"author":{"name":"Bogdan Bele","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987"},"headline":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access","datePublished":"2025-05-07T14:09:52+00:00","dateModified":"2026-04-13T09:44:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/"},"wordCount":1221,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/","url":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/","name":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg","datePublished":"2025-05-07T14:09:52+00:00","dateModified":"2026-04-13T09:44:58+00:00","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/05\/anydesk-security-breach-hero-image-qjd6v1y5z51khwt2a2cy9bh3s5a25djn921gpgdj5k.jpg","width":730,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/anydesk-security-breach-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"The AnyDesk Security Breach is a Stark Reminder of the Imperative for Truly Secure Remote Access"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987","name":"Bogdan Bele","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","caption":"Bogdan Bele"},"description":"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.","sameAs":["https:\/\/www.linkedin.com\/in\/bogdanbele\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65633\/revisions"}],"predecessor-version":[{"id":89980,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/65633\/revisions\/89980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/65720"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=65633"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=65633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}