What's new

Many TeamViewer users are being hacked.

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

D

Dan Goodin

Guest
teamviewer-login-640x360.jpg
(credit: modpr0be)

For more than a month, users of the remote login service TeamViewer have taken to Internet forums to report their computers have been ransacked by attackers who somehow gained access to their accounts. In many of the cases, the online burglars reportedly drained PayPal or bank accounts. No one outside of TeamViewer knows precisely how many accounts have been hacked, but there's no denying the breaches are widespread.

Continue reading on ArsTechnica
 
More info here

https://securityintelligence.com/compromised-before-my-very-eyes-how-i-almost-got-hacked/

and here

http://thehackernews.com/2016/06/teamviewer-hacked-security.html

If you are a TeamViewer user (it's a common tool that many do use to support family members, etc) - go and get the update now - they've introduce additional security features (Trusted Devices, Data Integrity).

It goes without saying - Teamviewer (or any other remote software) should only be used with specific intent, and strong passwords..
 
More info here

https://securityintelligence.com/compromised-before-my-very-eyes-how-i-almost-got-hacked/

and here

http://thehackernews.com/2016/06/teamviewer-hacked-security.html

If you are a TeamViewer user (it's a common tool that many do use to support family members, etc) - go and get the update now - they've introduce additional security features (Trusted Devices, Data Integrity).

It goes without saying - Teamviewer (or any other remote software) should only be used with specific intent, and strong passwords..

Personally I use Windows RDP and follow this great setup guide. http://www.howtogeek.com/175087/how-to-enable-and-secure-remote-desktop-on-windows/
 
I read about this hack early enough, wasn't affected as I do not run it as a daemon but only on demand, using the portable client.

What I would like to know really is whose fault this really was? The company blames the users for having weak passwords, the users blame the company, some even claim that they had 2-factor authentication enabled and they were still hacked. If that last accusation is true, the company behind TeamViewer screwed up majorly with security.
 
I wasnt breached even though i had the daemon running but than none of my computers have unattended access properly set up. They're saying its the accounts that got hacked rather. So even if my computer is running the daemon it appears offline or without a way to access from my account.
 
I have it running at startup on several family PCs I support but like SEM, I don't have unattended access setup so the users actually have to authorize the connection. Plus, I don't have a TeamViewer account, so all of the connections are ad hoc.
 
I have it running at startup on several family PCs I support but like SEM, I don't have unattended access setup so the users actually have to authorize the connection. Plus, I don't have a TeamViewer account, so all of the connections are ad hoc.

I use TeamViewer in the exact same way - no unattended access, so the remote party has to approve/allow the connection.
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top