02
TeamViewer refuses hack after PCs hijacked
TeamViewer users say their computers were hijacked while the software company’s systems inexplicably dropped offline and bank accounts emptied. TeamViewer denies it’s been hacked.
In the previous 24 hours, we have found a spike in complaints from people that say servers and their PCs, Macs were taken over via the widely used remote control tool on their machines.
It seems miscreants got control of casualties’ TeamViewer internet accounts, and used those to connect into computers, where they captured web browsers to access webmail, empty PayPal accounts, and order things from eBay and Amazon.
Over on Reddit, folks were lining up with stories of their systems being compromised via TeamViewer, triggering fears the system was hacked. TeamViewer makes remote control clients for OS X, Windows, Linux, Chrome OS, iOS and Android.
“When I sat down on my seat, I saw my mouse is going across the display. Needless to say, remote control was promptly revoked by me, and requested who [the hacker] is. At that stage, he tried to connect to my Ubuntu server, which has all my back-ups, and disconnected. Good thing I linked to [the server] right after he distant’d into my workstation. Before he attempted to open Firefox I revoked his permission. Promptly after, I began panicking, and believed he only stole all my passwords.”
It is maintained TeamViewer.com’s DNS was screwed up during the IT snafu, so preventing folks from getting through to the Germany-based business’s servers.
TeamViewer insisted that its security wasn’t broken after getting its systems back online. Individuals are reusing passwords from sites that have been hacked – such as LinkedIn and Tumblr, or are not using powerful enough qualifications, we are told.
“Users are still using precisely the same password across multiple user accounts with various providers. While many providers have appropriate security means set up, others are exposed,” the firm said.
TeamViewer spokesman Axel Schmidt told The Register from Germany by telephone tonight that his firm proposed individuals who’ve been hijacked contact law enforcement, and hasn’t found any indication of a violation.
Yet, we have heard from individuals who have used passwords unique to TeamViewer, that have empowered two-factor authentication, and have located no malware on their computers, losing control of their systems in recent days via TeamViewer. It is possible the DNS cockup was part of an elaborate strategy by cyber-fiends swipe their passwords and to intercept people’s logins, but the business is determined there was no security violation.
Should you use TeamViewer, now would be a great time to check your password and security settings to keep outside miscreants, and scrutinize your internet browser history for any unauthorized gets and your link logs.
There are no comments.