Russian intelligence agencies infiltrate TeamViewer's network



Hackers broke into the internal system of remote connection software '

TeamViewer ', and it was later revealed that the perpetrators were Russian intelligence agencies. TeamViewer explained that 'the damage was limited to the company's IT environment and there is no impact on customers.'

Statement | Trust Center | TeamViewer
https://www.teamviewer.com/en/resources/trust-center/statement/



TeamViewer confirms Russia broke into its corp IT network • The Register

https://www.theregister.com/2024/06/28/teamviewer_russia/

On June 26, 2024 local time, TeamViewer announced on its website that it had 'detected an anomaly in our internal IT environment.' On the 28th, TeamViewer announced that 'after an investigation, we believe that the attack was carried out by a threat actor known as APT29 or Midnight Blizzard,' indicating that Russian intelligence agencies were behind the attack.

APT29, Midnight Blizzard, and Cozy Bear are hacking groups believed to be Russian state-sponsored, and have previously launched attacks on the Republican National Committee and Microsoft.

It turns out that Russian government hacker 'Midnight Blizzard' had access to Microsoft's source code and internal systems - GIGAZINE



According to TeamViewer, APT29 infiltrated the company's network using employee login information, which resulted in the disclosure of employee names, company contact information, and encrypted employee passwords.

In response, TeamViewer issued a statement saying, 'The risks associated with encrypted passwords have been mitigated working with leading experts from our incident response partner, Microsoft. We have maximized our employee authentication procedures and put additional protections in place. Additionally, we have begun rebuilding our internal IT environment to a fully trusted state.'

TeamViewer explains that the attack was limited to its internal environment and did not affect its production environment, connection platform, or customer data.



in Security, Posted by log1p_kr