TeamViewer denies hack after PCs hijacked, PayPal accounts drained

TwinHeadedEagle

Level 41
Verified
Mar 8, 2013
22,627

Kuttz

Level 13
Verified
Top Poster
Well-known
May 9, 2015
625
For more than a month, users of the remote login service TeamViewer have taken to Internet forums to report their computers have been ransacked by attackers who somehow gained access to their accounts. In many of the cases, the online burglars reportedly drained PayPal or bank accounts. No one outside of TeamViewer knows precisely how many accounts have been hacked, but there's no denying the breaches are widespread.

Over the past three days, both Reddit and Twitter have exploded with such reports, often with the unsupported claim that the intrusions are the result of a hack on TeamViewer's network. Late on Friday afternoon, an IBM security researcher became the latest to report a TeamViewer account takeover.

"In the middle of my gaming session, I lose control of my mouse and the TeamViewer window pops up in the bottom right corner of my screen," wrote Nick Bradley, a practice leader inside IBM's Threat Research Group. "As soon as I realize what is happening, I kill the application. Then it dawns on me: I have other machines running TeamViewer!"

He continued:

I run downstairs where another computer is still up and running. Lo and behold, the TeamViewer window shows up. Before I am able to kill it, the attacker opens a browser window and attempts to go to a new web page. As soon as I reach the machine, I revoke control and close the app. I immediately go to the TeamViewer website and change my password while also enabling two-factor authentication.

Lucky for me, those were the only two machines that were still powered on with TeamViewer installed. Also lucky for me is the fact that I was there when it occurred. Had I not been there to thwart the attack, who knows what would have been accomplished. Instead of discussing how I almost got hacked, I’d be talking about the serious implications of my personal data leak.

Bradley's account came a few hours after Germany-based TeamViewer reaffirmed what it has steadfastly maintained for the past two weeks—that the account takeovers are the result of end users' careless passwords practices. In a statement, company officials alluded to the recent cluster of "megabreaches" that have dumped more than 642 million passwords into the public domain over the past month. The officials wrote:

As you have probably heard, there have been unprecedented large scale data thefts on popular social media platforms and other web service providers. Unfortunately, credentials stolen in these external breaches have been used to access TeamViewer accounts, as well as other services.

We are appalled by the behaviour of cyber criminals and are disgusted by their actions towards TeamViewer users. They have taken advantage of common use of the same account information across multiple services to cause damage.

For full article please visit at:
TeamViewer users are being hacked in bulk, and we still don’t know how
 

Myriad

Level 7
Verified
Well-known
May 22, 2016
349
On installation , Teamviewer creates a service which is set to run , by default , when Windows starts.

Some months ago , I changed this service to "disabled" on two machines I was running it on ,
and Teamviewer still worked just fine , and fully functional as far as I could tell ..... strange , I know !!

I thought this was a much safer option and I've left it like this .... all the goodness without the risk.
Teamviewer is far too useful to me to just ditch it at this stage.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
The thing here is use Teamviewer for important purpose and close the session immediately, remember that we are definitely open for any possible intruders no matter secure the connection.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top