Remote access giant TeamViewer says Russian spies hacked its corporate network


TeamViewer, the company that makes widely used remote access tools for companies, has confirmed an ongoing cyberattack on its corporate network.

In a statement Friday, the company attributed the compromise to government-backed hackers working for Russian intelligence, known as APT29 (and Midnight Blizzard). The Germany-based company said its investigation so far points to an initial intrusion on June 26 “tied to credentials of a standard employee account within our corporate IT environment.”

Read more…
Source: TechCrunch


Sign up for our Newsletter


Related:

  • LuckyMouse uses malicious NDISProxy Windows driver to target gov’t entities

    September 10, 2018

    The LuckyMouse advanced persistent threat (APT) is back with a twist in tactics that harnesses LeagSoft certificates to spread Trojans by way of malicious NDISProxy drivers. It was back in June that researchers discovered that LuckyMouse, also known as EmissaryPanda and APT27, had targeted a national data center containing Asian government resources. In this previous campaign, LuckyMouse used ...

  • ‘Domestic Kitten’ Mobile Spyware Campaign Aims at Iranian Targets

    September 7, 2018

    Spreading via fake Android apps, the malware lifts a range of sensitive information from victims’ devices. A mobile spyware campaign against mainly Iranian citizens has been spotted – with evidence that the Iranian government might be involved. The operation is dubbed Domestic Kitten by Check Point researchers — “kitten” to follow common APT nomenclature for Iranian groups ...

  • APT10 Under Close Scrutiny as Potentially Linked to Chinese Ministry of State Security

    September 3, 2018

    n advanced threat actor has been associated with China’s Ministry of State Security via two individuals and a Chinese firm. Researchers claim that APT10, a likely China-based threat actor, is believed directly connected to the Chinese Ministry of State Security’s (MSS) Tianjin bureau. The allegations come from CrowdStrike which released a report Friday that claims it has found firm ...

  • Botched CIA Communications System Helped Blow Cover of Chinese Agents

    August 15, 2018

    It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected U.S. spies. But since then, a question has loomed over the entire debacle. How were the Chinese able to roll up ...

  • A First Look at the North Korean Malware Family Tree

    August 9, 2018

    Security researchers have analyzed malware samples from threat actors associated with North Korea and discovered connections with tools from older unattributed campaigns. The research is spread over several months and connects a diverse range of operations from cyberespionage to financially-motivated campaigns. The campaigns analyzed by the researchers and a timeline of their release can be shown below. Read more: Source: ...

  • NSO Spyware Targets Saudi Human Rights Activists and Researchers

    July 31, 2018

    Amnesty International, one of the most prominent non-profit human rights organizations in the world, claims one of its staff members has been targeted by a sophisticated surveillance toolmade by Israel’s NSO Group. The NSO Group is an Israeli firm that’s mostly known for selling high-tech spyware and surveillance malware capable of remotely cracking into Apple’s iPhones and Google’s Android devices to intelligence ...