TeamViewer Corporate Environment Breached by APT Group
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
Background and Impact
TeamViewer is widely used for remote access, allowing users to control computers as if they were in front of the device. With over 640,000 customers worldwide and installations on over 2.5 billion devices, any breach is significant due to the potential for full access to internal networks.
This incident follows a 2016 breach linked to Chinese threat actors using the Winnti backdoor. Although data was not stolen, the 2019 confirmation of the breach highlighted potential security risks.
Alleged APT Group Involvement
News of the breach was first reported by IT security professional Jeffrey on Mastodon, who shared parts of an alert from the Dutch Digital Trust Center. The alert from the NCC Group Global Threat Intelligence team mentioned a significant compromise of the TeamViewer platform by an APT group.
An additional alert from Health-ISAC, a community for healthcare professionals to share threat intelligence, warned that the Russian hacking group APT29, also known as Cozy Bear, NOBELIUM, and Midnight Blizzard, is actively exploiting TeamViewer.
“On June 27, 2024, Health-ISAC received information from a trusted intelligence partner that APT29 is actively exploiting TeamViewer,” reads the alert. Health-ISAC advised reviewing logs for unusual remote desktop traffic and noted that threat actors have been observed leveraging remote access tools, including TeamViewer.
Trending: Offensive Security Tool: Freeway
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com