Best Remote Desktop Software 2026: 10 Tools Compared
Best remote desktop software 2026: TeamViewer ($24.90/mo), AnyDesk, Splashtop, RustDesk compared on verified pricing, CVEs, and IT use cases. $3.92B market (Fortune Business Insights, 2025).
In late December 2023, attackers breached AnyDesk's production systems. Source code and a private code signing certificate were stolen. The AnyDesk security breach wasn't disclosed publicly until February 2, 2024 — roughly six weeks after the initial compromise. Here's what happened, what was actually compromised, and what IT teams should do today.
The numbers behind this: The average cost of a data breach reached $4.88 million globally in 2024 — the largest single-year increase since the COVID pandemic. Breaches involving stolen credentials take an average of 292 days to identify and contain. (IBM Cost of a Data Breach Report, 2024)
The AnyDesk security breach began in late December 2023, when attackers gained unauthorized access to AnyDesk's production servers. This was not a ransomware attack — no ransom demand was made, no data was encrypted. It was a targeted intrusion aimed at exfiltrating high-value assets from AnyDesk's core infrastructure.
The breach was detected in mid-January 2024 during an internal security audit. AnyDesk immediately engaged CrowdStrike for incident response. The public disclosure didn't come until February 2, 2024 — after AnyDesk had already quietly shipped version 8.0.8 on January 29, signed with a new certificate, under the cover of a maintenance window.
| Date | Event | |------|-------| | Late December 2023 | Attackers gain access to AnyDesk production systems | | Mid-January 2024 | AnyDesk detects the breach via internal security audit | | January 29, 2024 | AnyDesk releases Windows v8.0.8 with new signing certificate; portal maintenance begins | | Jan 29 – Feb 1, 2024 | Portal maintenance window — login disabled | | February 2, 2024 | AnyDesk publishes official public statement | | February 3, 2024 | Resecurity reports 18,317 AnyDesk credentials for sale on Exploit[.]in | | February 6–7, 2024 | DigiCert revokes the "philandro Software GmbH" certificate |
Four elements were confirmed as compromised in the AnyDesk security breach.
1. Production server access. Attackers obtained unauthorized access to AnyDesk's production servers — the company's core infrastructure.
2. Source code. AnyDesk's proprietary source code was stolen. This exposes the internal software architecture and could facilitate discovery of future vulnerabilities.
3. Private code signing certificate. The certificate issued to "philandro Software GmbH" (serial: 0dbf152deaf0b981a8a938d53f769db8, valid from December 13, 2021) was compromised. This certificate allowed code to be signed as if it came officially from AnyDesk.
4. Two relay servers. Sources indicate that two relay servers located in Europe were affected — though sources disagree on the exact geographic scope.
The real-world risk of the stolen certificate: Cybereason identified over 500 samples of Agent Tesla malware signed with the compromised philandro Software GmbH certificate appearing on VirusTotal from June 2022 onward. Those malicious files appeared legitimate to antivirus engines. AnyDesk notes there's no direct evidence these signatures occurred after the breach — but the supply-chain risk is documented, not theoretical. (Cybereason, 2024)
AnyDesk officially stated, following the CrowdStrike investigation, that the following were not affected:
On February 3, 2024 — one day after AnyDesk's official disclosure — cybersecurity firm Resecurity reported that 18,317 credentials associated with AnyDesk customer accounts had appeared for sale on the Exploit[.]in forum, listed at $15,000 by a threat actor known as "Jobaaaaa."
This point deserves a critical distinction that many reports missed.
These credentials almost certainly did not come from AnyDesk's server breach. Resecurity states this explicitly in their own report: these compromised credentials "are widely believed to be the result of infostealer infections" — meaning malware on individual users' machines harvested saved passwords, not server-side theft. Resecurity acknowledges the uncertainty directly: "the sources and methods for acquiring data of this nature may vary depending on threat actors' unique TTPs."
The timing is telling: the credentials appeared on Exploit[.]in on February 3 — one day after AnyDesk declared the incident resolved. This suggests an opportunistic monetization campaign, exploiting media coverage to offload pre-existing stolen data. The "Jobaaaaa" actor (active since 2021 on Exploit[.]in) was never attributed to AnyDesk's infrastructure compromise.
Bottom line: The Resecurity credential leak and the AnyDesk production breach are two overlapping but distinct incidents. Treating them as one event — as many reports did — gives an inaccurate picture of what happened.
AnyDesk's response was technically swift, though criticized for initial opacity on the timeline.
Immediate technical actions:
0a8177fcd8936a91b5e0eddf995b0ba5)Note on binaries signed with the old certificate: After revocation, Microsoft SmartScreen began flagging binaries signed with the old philandro Software GmbH certificate as potentially malicious. Any AnyDesk installation below version 8.0.8 using the old certificate should be treated as untrusted.
The AnyDesk security breach didn't happen in isolation. Two other significant incidents hit the remote access sector in the same timeframe.
TeamViewer — June 2024 (APT29): Attackers affiliated with APT29 (Russian SVR, also known as "Midnight Blizzard") compromised TeamViewer's internal corporate IT network. The incident was contained to the employee directory — product environments and customer data were not affected. Microsoft assisted with the response. Notable: TeamViewer had also been compromised by Chinese hackers (Winnti group) in 2016 — and didn't disclose it publicly for three years, until 2019.
ConnectWise ScreenConnect — February 2024 (separate CVE): On February 19, 2024, ConnectWise disclosed CVE-2024-1709, a critical (CVSS 10.0) authentication bypass affecting ScreenConnect versions 23.9.7 and earlier. LockBit 3.0 affiliates exploited it at scale against MSPs. Key distinction: this was a product CVE, not a vendor infrastructure breach — mechanically different from the AnyDesk incident. CISA added CVE-2024-1709 to its Known Exploited Vulnerabilities catalog on February 22, 2024.
What these incidents reveal: Remote access tools are a high-priority target. Whether via infrastructure compromise (AnyDesk), internal network intrusion (TeamViewer), or product CVE (ConnectWise), the absence of a documented incident doesn't guarantee the absence of risk — it reflects what's been disclosed. (Sophos Active Adversary Report, 2024)
If your organization uses AnyDesk, here are the actions to take — in priority order.
Immediate actions (if not already done):
Medium-term governance actions:
For teams evaluating a migration:
If the AnyDesk security breach has triggered a review of your remote access tooling, our comparison of the 7 best AnyDesk alternatives in 2026 covers Splashtop, RustDesk, TeamViewer, and Sobrii Remote with verified pricing and honest security records.
The AnyDesk security breach raises specific questions for European organizations.
GDPR (Article 33): If AnyDesk qualifies as a data processor under GDPR for your data, the compromise of its production systems may constitute a breach requiring notification to your supervisory authority within 72 hours — even in the absence of proof of customer data exfiltration. AnyDesk's "no evidence of exfiltration" statement mitigates the risk but may not eliminate the obligation, depending on your national authority's interpretation.
NIS2: In effect since October 2024 across most EU member states, NIS2 requires digital infrastructure providers — a category that covers a remote desktop software vendor — to issue an early warning within 24 hours, a full incident report within 72 hours, and a final report within one month. Enterprise customers using AnyDesk must also evaluate whether this incident constitutes a "significant incident" for their own NIS2 reporting obligations.
When did the AnyDesk breach start? The initial compromise occurred in late December 2023. It was detected by AnyDesk in mid-January 2024 during an internal security audit, and publicly disclosed on February 2, 2024 — approximately six weeks after the initial breach.
Is AnyDesk safe to use today? AnyDesk replaced compromised systems, revoked and replaced certificates, and forced a portal password reset. CrowdStrike conducted the forensic investigation. Version 8.0.8 and later with the new certificate is considered safe by AnyDesk. No malicious code modifications were found. That said, each organization should assess its own residual risk tolerance, particularly in regulated environments.
Did the 18,317 stolen credentials come from AnyDesk's servers? Almost certainly not. Resecurity, which reported the leak, states these credentials are "widely believed to be the result of infostealer infections" — malware on individual users' machines. They appeared on the dark web one day after AnyDesk's disclosure, suggesting an opportunistic campaign rather than direct server-side exfiltration.
Who was responsible for the AnyDesk security breach? The attacker's identity was never publicly disclosed by AnyDesk and has not been confirmed through official attribution. No specific APT group was named in official reports. Any nation-state attribution found in secondary sources is speculative.
Does our organization need to notify a data protection authority? This depends on your jurisdiction, AnyDesk's role in your data processing chain, and your national authority's interpretation. As a general rule, if AnyDesk processes personal data on your behalf, the compromise of its systems may trigger GDPR notification requirements. Consult your DPO.
Did AnyDesk change its pricing after the breach? Yes — but independently of the breach. In October 2025, AnyDesk switched to connection-based licensing and raised prices 26–40%. Current plans (annual billing) start at approximately $28.90/month for the Solo tier.
The AnyDesk security breach illustrates a structural risk inherent to remote access tools: their architecture makes them high-value targets, and a vendor compromise can have downstream consequences for the entire user chain — even without direct customer data exfiltration. For IT teams, the lesson isn't to avoid remote access tools. It's to audit them with the same rigor as any other critical infrastructure.
Compare remote access tools: TeamViewer vs AnyDesk security deep-dive →Sobrii Remote is a remote access solution built for IT teams managing Windows device fleets. Every session includes full device context — battery status, CPU/GPU health, storage, software inventory — before the connection is established. TLS 1.3 architecture, AES-256 encryption, data hosted in France on Azure.
Download Sobrii Remote — secure remote access for IT fleets →Managing 50+ Windows devices and looking for a consolidated fleet view? Sobrii Platform combines asset management, fleet health, and remote access in a single dashboard.
Discover how sobrii transforms IT fleet management.
Book a demo