• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
teamviewer detects security breach in corporate it environment

TeamViewer Detects Security Breach in Corporate IT Environment

You are here: Home / General Cyber Security News / TeamViewer Detects Security Breach in Corporate IT Environment
June 28, 2024

TeamViewer on Thursday disclosed it detected an “irregularity” in its inside company IT setting on June 26, 2024.

“We instantly activated our reaction group and processes, began investigations alongside one another with a staff of globally renowned cyber security experts and executed required remediation measures,” the corporation said in a assertion.

It further pointed out that its company IT ecosystem is wholly minimize off from the products ecosystem and that there is no evidence to point out that any shopper information has been impacted as a end result of the incident.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It did not disclose any aspects as to who may have been behind the intrusion and how they have been in a position to pull it off, but stated an investigation is underway and that it would present standing updates as and when new data becomes accessible.

Cybersecurity

TeamViewer, primarily based in Germany, is the maker of remote monitoring and administration (RMM) software package that permits managed provider vendors (MSPs) and IT departments to manage servers, workstations, network gadgets, and endpoints. It can be employed by above 600,000 clients.

Apparently, the U.S. Overall health Data Sharing and Analysis Middle (Health-ISAC) has issued a bulletin about threat actors’ lively exploitation of TeamViewer, according to the American Clinic Affiliation (AHA).

“Threat actors have been noticed leveraging remote entry equipment,” the non-revenue reportedly stated. “Teamviewer has been noticed currently being exploited by danger actors connected with APT29.”

It is currently unclear at this stage no matter whether this indicates the attackers are abusing shortcomings in TeamViewer to breach client networks, utilizing lousy security techniques to infiltrate targets and deploy the software, or they have carried out an attack on TeamViewer’s have units.

APT29, also called BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard, and The Dukes, is a point out-sponsored menace actor affiliated with the Russian International Intelligence Provider (SVR). Not long ago, it was joined to the breaches of Microsoft and Hewlett Packard Enterprise (HPE).

Cybersecurity

Microsoft has because discovered that some purchaser email inboxes were also accessed by APT29 pursuing the hack that arrived to light-weight previously this yr, for each stories from Bloomberg and Reuters.

“This 7 days we are continuing notifications to clients who corresponded with Microsoft company email accounts that have been exfiltrated by the Midnight Blizzard threat actor,” the tech huge was quoted as declaring to the information agency.

Found this post intriguing? Adhere to us on Twitter  and LinkedIn to examine additional distinctive content material we write-up.


Some parts of this post are sourced from:
thehackernews.com

Previous Post: «rust based p2pinfect botnet evolves with miner and ransomware payloads Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Next Post: Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment researchers warn of flaws in widely used industrial gas analysis»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.