TeamViewer: Chinese hackers behind the violation

A group of state-backed Chinese hackers allegedly broke into German software company TeamViewer in 2016, according to a Der Spiegel article.

"In the fall of 2016, TeamViewer was the target of a cyber attack. "Our systems detected suspicious activity in a timely manner, thus avoiding any significant damage."

One millionς της TeamViewer δήλωσε στο ZDNet ότι η έρευνα που ακολούθησε δεν βρήκε σημαντικές ζημιές ή απώλειες .

TeamViewer

A team of expert internal and external cyber investigators, who worked closely with the relevant authorities, successfully stopped the attack and using all available forensic tools did not discover that customer or other sensitive data had been stolen . The systems were not infected and the TeamViewer application source code was not stolen or abused in any way.

According to Der Spiegel, the hackers who breached TeamViewer's network used Winnti, a trojan historically known to be in the arsenal of Beijing's state hackers.

The malware first appeared in 2009 and was initially used only by a group of Chinese hackers, whom security researchers at the time called the Winnti group.

However, this has changed in recent years when security researchers began to discover Winnti malware in various other attacks by many different Chinese groups.

"The assumption is that the same malware has been shared (or sold) to different groups," the Chronicle said. earlier this week.

This makes it impossible, at least for the time being, to know which of the (many) Chinese state-funded hacking groups was behind the invasion of TeamViewer.

______________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).