Security

Cyber-crime

TeamViewer can't bring itself to say someone broke into its network – but it happened

Claims customer data, prod environment not affected as NCC sounds alarm


Updated TeamViewer on Thursday said its security team just "detected an irregularity" within one of its networks – which is a fancy way of saying someone broke in.

We're told this "irregularity" was spotted inside TeamViewer's corporate IT environment on Wednesday, and that the biz immediately called in reinforcements in the form of cyber security investigators, implemented "necessary remediation measures," and activated its incident response team and processes, according to an announcement on Thursday.

TeamViewer sells software to remotely control and manage Windows PCs and other computers as well as tools to access systems via the web, and is used the world over. The words "TeamViewer" and "security breach" will make some people's blood run cold given how pervasively it is used; a compromise of the platform could be devastating. TeamViewer says it has more than 600,000 customers.

Regardless, the software maker's disclosure attempted to downplay the intrusion – sorry, "irregularity."

"TeamViewer's internal corporate IT environment is completely independent from the product environment," it read. "There is no evidence to suggest that the product environment or customer data is affected."

But, it added, "investigations are ongoing and our primary focus remains to ensure the integrity of our systems."

TeamViewer spokesperson Maria Gordienko declined to answer The Register's specific questions about the incident – including whether it was ransomware or worse – citing the ongoing investigation. "As soon as new relevant facts become available, we will update the statement for the general public," she deflected. 

It appears top infosec house NCC Group has already tipped off its customers to the security snafu, and blamed an unnamed advanced persistent threat (APT) team.

"The NCC Group Global Threat Intelligence team has been made aware of significant compromise of the TeamViewer remote access and support platform by an APT group," NCC warned in a memo, shared earlier on Mastodon by an IT security pro going by the name Jeffrey.

"Due to the widespread usage of this software the following alert is being circulated securely to our customers," the shared missive, confirmed as legit by NCC, continued. We've asked for the security group for further details for the public.

And speaking of TeamViewer and APTs, Brett Callow, threat analyst at Emsisoft, pointed to an alert Thursday by the US-based Health Information Sharing and Analysis Center (H-ISAC) to the health sector about ongoing exploitation of TeamViewer and how healthcare operators should respond.

That memo reads:

The Health Information Sharing and Analysis Center June 27 issued a threat bulletin alerting the health sector to active cyberthreats exploiting TeamViewer. H-ISAC recommends users review logs for any unusual remote desktop traffic. Threat actors have been observed leveraging remote access tools, H-ISAC said. The agency recommends users enable two-factor authentication and use the allowlist and blocklist to control who can connect to their devices, among other measures.

H-ISAC noted in its industry bulletin that it had been warned by a friendly intel partner that APT29 – aka Russian intelligence's Cozy Bear crew – has been "actively exploiting Teamviewer."

"TeamViewer has been observed being exploited by threat actors associated with APT29," it added.

Which could mean the Russians are separately exploiting weaknesses within TeamViewer to get into people's networks, or taking advantage of poor customer-side security to get in via the remote-desktop software. Or H-ISAC is saying the aforementioned intrusion was carried out by the Kremlin into TeamViewer's own systems.

We're seeking further details and will let you know when we hear more. ®

Updated to add

TeamViewer has confirmed it was hit by Russia's APT29 aka Cozy Bear.

Send us news
25 Comments

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Gang gobbles 15K credentials from cloud and email providers' garbage Git configs

Emeraldwhale looked sharp – until it made a common S3 bucket mistake

Uncle Sam outs a Russian accused of developing Redline infostealing malware

Or: why using the same iCloud account for malware development and gaming is a bad idea

Feds investigate China's Salt Typhoon amid campaign phone hacks

'They're taunting us,' investigator says and it looks like it's working

JPMorgan Chase sues scammers following viral 'infinite money glitch'

ATMs paid customers thousands ... and now the bank wants its money back

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Biz hired, and fired, a fake North Korean IT worker – then the ransom demands began

'My webcam isn't working today' is the new 'The dog ate my network'

Critical hardcoded SolarWinds credential now exploited in the wild

Another blow for IT software house and its customers

Just how private is Apple's Private Cloud Compute? You can test it to find out

Also updates bug bounty program with $1M payout