A group of state-backed Chinese hackers allegedly broke into German software company TeamViewer in 2016, according to a Der Spiegel article.
"In the fall of 2016, TeamViewer was the target of a cyber attack. "Our systems detected suspicious activity in a timely manner, thus avoiding any significant damage."
One millionfaceς της TeamViewer δήλωσε στο ZDNet ότι η έρευνα που ακολούθησε δεν βρήκε σημαντικές ζημιές ή απώλειες data.
A team of expert internal and external cyber investigators, who worked closely with the relevant authorities, successfully stopped the attack and using all available forensic tools did not discover data that customer or other sensitive data had been stolen information. The systems were not infected and the TeamViewer application source code was not stolen or abused in any way.
According to Der Spiegel, the hackers who breached TeamViewer's network used Winnti, a backdoor cuts trojan historically known to be in the arsenal of Beijing's state hackers.
The malware first appeared in 2009 and was initially used only by a group of Chinese hackers, whom security researchers at the time called the Winnti group.
However, this has changed in recent years when security researchers began to discover Winnti malware in various other attacks by many different Chinese groups.
"The assumption is that the same malware has been shared (or sold) to different groups," the Chronicle said. earlier this week.
This makes it impossible, at least for the time being, to know which of the (many) Chinese state-funded hacking groups was behind the invasion of TeamViewer.
______________________
- Patch Tuesday May KB4494441, KB4499167, KB4499179 & KB4499181
- Lenovo foldable PC: Presentation of the first foldable
- Microsoft vs Google: Why browsers' war does not focus on privacy
- Windows 10 20H1 ISO with Integrated Universal Search