Perks Posted June 2, 2016 Share Posted June 2, 2016 Quote Users are reporting breaches, and thousands of dollars have been stolen with the client, all over/r/teamviewer and at their support Twitter account. TV is blaming users with reusing passwords, yet users with 2FA and unique very long generated passwords were hacked. Some also suggest that their DNS servers were hijacked and the clients believed the fake server, being the method of the attack. One of the main problems are that they are not taking responsibility: (quoted from /u/rich-uk) Teamviewer is being used as a vector of attack. This has happened on other sites where they had no critical information and within 48 hours everyone's logged in sessions were logged out, an email went round saying you had to click the link in the email (to verify ownership) and set up two factor auth as they knew they were being targeted. Teamviewer must know they are being targeted, and the stakes are high as the software allows complete access to a trusted machine - it's basically a master key - and there hasn't been a single response with teeth from teamviewer. Update: TV still denies a breacheven with this thread linked. A few links:Their official statement blaming user's passwords - archive.is snapshotTheir support Twitter account with user interactions - [Mirror of some] [canned replies] [in case they take them down], archive.is snapshot of someTV threatening writers to change articlesThe /r/teamviewer megathreadThe Register article on the issue - They are getting canned replies too.Inquisitr article on the issue Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now