• AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    5 months ago

    This is the best summary I could come up with:


    We’re told this “irregularity” was spotted inside TeamViewer’s corporate IT environment on Wednesday, and that the biz immediately called in reinforcements in the form of cyber security investigators, implemented “necessary remediation measures,” and activated its incident response team and processes, according to an announcement on Thursday.

    The words “TeamViewer” and “security breach” will make a lot of people’s blood run cold given how pervasively it is used – in homes, organizations, and businesses – so a compromise of the platform could be devastating.

    TeamViewer spokesperson Maria Gordienko declined to answer The Register’s specific questions about the incident – including whether it was ransomware or worse – citing the ongoing investigation.

    It appears top infosec house NCC Group has already tipped off its customers to the security snafu, and blamed an unnamed advanced persistent threat (APT) team.

    H-ISAC noted in its industry bulletin that it had been warned by a friendly intel partner that APT29 – aka Russian intelligence’s Cozy Bear crew – has been “actively exploiting Teamviewer.”

    Which could mean the Russians are separately exploiting weaknesses within TeamViewer to get into people’s networks, or taking advantage of poor customer-side security to get in via the remote-desktop software.


    The original article contains 514 words, the summary contains 197 words. Saved 62%. I’m a bot and I’m open source!