A group of state-backed Chinese hackers allegedly broke into German software company TeamViewer in 2016, according to a Der Spiegel article.
"In the fall of 2016, TeamViewer was the target of a cyber attack. "Our systems detected suspicious activity in a timely manner, thus avoiding any significant damage."
A TeamViewer spokesperson told ZDNet that the ensuing investigation found no significant damage or loss data.
Μια ομάδα εμπειρογνωμόνων εσωτερικών και εξωτερικών ερευνητών στον κυβερνοχώρο, που συνεργάστηκαν στενά με τις αρμόδιες αρχές, σταμάτησε με επιτυχία την επίθεση και με όλα τα διαθέσιμα μέσα εγκληματολογίας δεν ανακάλυψαν στοιχεία για το ότι είχαν κλαπεί δεδομένα πελατών ή άλλες ευαίσθητες information. The systems were not infected and the TeamViewer application source code was not stolen or abused in any way.
According to Der Spiegel, the hackers who breached TeamViewer's network used the Winnti, one backdoor cuts trojan historically known to be in the arsenal of Beijing's state hackers.
The malware was first introduced in 2009 and was initially only used by a group of Chinese hacker, which security researchers at the time called the Winnti group.
However, this has changed in recent years when security researchers began to discover Winnti malware in various other attacks by many different Chinese groups.
"The assumption is that the same malware has been shared (or sold) to different groups," the Chronicle said. earlier this week.
This makes it impossible, at least for the time being, to know which of the (many) Chinese state-funded hacking groups was behind the invasion of TeamViewer.
______________________
- Patch Tuesday May KB4494441, KB4499167, KB4499179 & KB4499181
- Lenovo foldable PC: Presentation of the first foldable
- Microsoft vs Google: Why browsers' war does not focus on privacy
- Windows 10 20H1 ISO with Integrated Universal Search