TeamViewer Admits Breach from 2016

The company says it stopped the attack launched by a Chinese hacking group.



TeamViewer, a German software company specializing in remote access and desktop sharing software, announced that it suffered an attack, presumably from a Chinese hacking group, in 2016. According to the company, the attack was discovered and stopped at the time, with no evidence of damage or compromise found.

The attackers used Winnti, a backdoor Trojan known to have been developed and used by groups located in China. Now used by multiple Chinese hacking groups, the software is considered a reliable indicator that the attack originated within China.

Prior to the Winnti attack, TeamViewer saw a campaign of attacks against user accounts among its customers. The German publication Der Spiegel reported that the Winnti campaign was active inside TeamViewer since 2014, a claim that, in an email message to Dark Reading, TeamViewer said was possible, though they said that the attack didn’t become active until 2016, at which point they stopped the activity before any damage occurred.

Read more here.

 

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2019 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service