Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

TeamViewer Hack Officially Attributed to Russian Cyberspies

TeamViewer has confirmed that the Russian cyberespionage group APT29 appears to be behind the recent hack.

Teamviewer hacked

TeamViewer has confirmed that a notorious Russian cyberespionage group appears to be behind the recent hacker attack targeting the company’s systems. 

The remote connectivity software provider revealed last week that it had detected an intrusion on June 26. 

According to follow-up statements issued by the company on Friday and over the weekend, the breach only impacted its internal corporate IT environment, and did not affect its product environment, the TeamViewer connectivity platform, or any customer data. 

“Following best-practice architecture, we have a strong segregation of the Corporate IT, the production environment, and the TeamViewer connectivity platform in place,” TeamViewer explained. “This means we keep all servers, networks, and accounts strictly separate to help prevent unauthorized access and lateral movement between the different environments.”

The company revealed that the attackers hacked into its systems after obtaining the credentials for a standard employee account that had access to the corporate IT environment. 

The hackers leveraged the employee account to copy employee directory data such as names, corporate contact information, and encrypted employee passwords for the internal corporate environment. 

Advertisement. Scroll to continue reading.

“The risk associated with the encrypted passwords contained in the directory has been mitigated in collaboration with leading experts from our incident response partner Microsoft,” TeamViewer said.

When the hack came to light, NCC Group reported that an APT was behind the attack, and the US-based Health Information Sharing and Analysis Center (Health-ISAC) issued an alert saying that the Russia-linked APT29 was behind the intrusion.  

TeamViewer has confirmed that it currently attributes the attack to APT29, which among many other names is also known as Cozy Bear and Midnight Blizzard. This state-sponsored cyberspy group is known for high-impact attacks targeting important organizations, including Microsoft.  

TeamViewer’s confirmation that APT29 appears to be behind the attack came just as Microsoft has been alerting more customers that the group has stolen their emails as part of a recent campaign. 

*APT29 is also known as ATK7, Blue Kitsune, BlueBravo, Cloaked Ursa, G0016, Grizzly Steppe, Group 100, Iron Hemlock, ITG11, Minidionis, Nobelium, SeaDuke, TA421, The Dukes, UAC-0029, and Yttrium. 

Related: Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails

Related: US, Israel Provide Guidance on Securing Remote Access Software

Related: AnyDesk Shares More Information on Recent Hack

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.