A team Chinese state-sponsored hackers allegedly breached the German company software TeamViewer το 2016, σύμφωνα με μια δημοσίευση του Der Spiegel.
"In the fall of 2016, TeamViewer was the target of a cyber attack. "Our systems detected suspicious activity in a timely manner, thus avoiding any significant damage."
A TeamViewer spokesman told ZDNet that the ensuing investigation found no significant data damage or loss.
A team of expert internal and external cyber investigators, working closely with the relevant authorities, successfully stopped the attack and using all available forensic tools found no evidence that customer data or other sensitive information had been stolen. information. The systems were not infected and the TeamViewer application source code was not stolen or abused in any way.
According to Der Spiegel, the hackers who breached TeamViewer's network used the Winnti, one backdoor cuts trojan which is historically known to be in the arsenal of Beijing's state hackers.
The malicious λογισμικό παρουσιάστηκε για πρώτη φορά το 2009 και αρχικά χρησιμοποιήθηκε μόνο από μία ομάδα Κινέζων hacker, τους οποίους οι researchers security at that time they called Winnti group.
However, this has changed in recent years when security researchers began to discover Winnti malware in various other attacks by many different Chinese groups.
"The assumption is that the same malware has been shared (or sold) to different groups," the Chronicle said. earlier this week.
This makes it impossible, at least for now, to know which of the (many) Chinese state-sponsored hacking groups were behind the invasion in TeamViewer.
______________________
- Patch Tuesday May KB4494441, KB4499167, KB4499179 & KB4499181
- Lenovo foldable PC: Presentation of the first foldable
- Microsoft vs Google: Why browsers' war does not focus on privacy
- Windows 10 20H1 ISO with Integrated Universal Search