TeamViewer: software hides remote connections

A new targeted attack has been detected, via , which aimed to steal financial information from government and financial targets across Europe and beyond.

Check Point researchers announced on Monday that the attacks targeted government and financial officials, as well as representatives of various embassies in Europe, Nepal, Kenya, Liberia, Lebanon, Guyana and Bermuda.TeamViewer

The attack started with a standard μήνυμα phishing το οποίο περιείχε ένα κακόβουλο συνημμένο που ισχυρίζεται ότι ήταν ένα “άκρως απόρρητο” έγγραφο από τις Ηνωμένες Πολιτείες.

The subject line stated "Military Financing Program" and the .XLSM document bore the US State Department logo.

So if someone opened the document and activated the macros, two files came out - a regular AutoHotkeyU32.exe program and a malicious TeamViewer DLL.

The AutoHotkeyU32 program was used to send a POST request to the server and control (C&C) of the attacker, but also downloaded more malicious scripts that were capable of taking screenshots of the target computer, stealing information and then sending it to the attacker.

TeamViewer is often used by businesses for remote PC access. However, due to its capabilities, the it is also used by fraudsters to gain access to remote systems.

The malicious variant with TeamViewer DLL provided attackers with modified functionality, and hid any connection to TeamViewer. So the victims did not know that someone was connected to their computer.

The main targets of this attack as mentioned above were public financial sector players and according to the researchers the would-be hacker was a Russian.

_________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).