Query Details
# Rule: RustDesk Remote Access Tool usage
## Description
Detects installation or use of remote access tools like RustDesk on servers or privileged endpoints where such tools are not authorized. Attackers often install legitimate remote tools to maintain remote access and bypass controls.
- **Source:** The DFIR Report — From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira (Aug 05, 2025)
## Detection Logic
- Monitor for installer execution of `rustdesk.exe`/`rustdesk-service` or creation of persistent services related to RustDesk.
- Alert when remote access tools are installed on domain controllers, file servers, or admin workstations.
- Correlate with SSH tunneling, scheduled tasks, or service creation.
## Tags
- Persistence
- Remote Access
- MITRE ATT&CK: T1219 (Remote Access Tools), T1543 (Create or Modify System Process)
## Search Query
```kql
DeviceProcessEvents
| where FileName has_any ("rustdesk.exe","rustdesk-service.exe","rustdesk")
| join kind=leftouter (
DeviceImageLoadEvents
| where FolderPath has "Program Files" or FolderPath has "ProgramData"
) on DeviceId
| project Timestamp, DeviceName, FileName, ProcessCommandLine, FolderPath, ReportId
```
This query is designed to detect the installation or use of the RustDesk remote access tool on servers or privileged endpoints where such tools are not authorized. Here's a simplified breakdown of what the query does:
Purpose: The query aims to identify unauthorized installations or executions of the RustDesk remote access tool, which attackers might use to maintain remote access to systems.
Detection Logic:
rustdesk.exe, rustdesk-service.exe, or containing rustdesk.How It Works:
Tags and Context:
Overall, this query helps security teams monitor and alert on unauthorized use of remote access tools like RustDesk, which could indicate potential security breaches or policy violations.

Ali Hussein
Released: November 12, 2025
Tables
Keywords
Operators