Data Breach

TeamViewer hacked? The company officially denies it

Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any incident.

Many TeamViewer users reported that their systems were accessed by hackers via the popular support tool, but the company denies any security breach.

First claims appeared on Reddit, several users reported that unauthorized parties remotely accessed their systems through TeamViewer. In same cases, the mysterious attackers attempted to steal money from users’ PayPal accounts in order to purchase items one-commercee platforms, including eBay. This was possible because victims use to configured to remember credentials for commonly used online services.

The mysterious thing is that some users also reported to have been hacked even with a two-factor authentication (2FA) enabled.

Below a couple of messages published on the thread in Reddit.

[–]Morblius 9 punti  

Many Internet users speculate that the tool was hacked, another possibility is that hackers have identified a zero-day flaw in the popular application. On the other side, the company downplayed both hypotheses explaining that most likely attackers leveraged leaked passwords that were shared by users on multiple web services.

“As always when we receive alerts about potential security alerts, we look at the issue at hand. This is what we have done in this case: There is no evidence to suggest that TeamViewer has been hacked. Neither do we have any information that would suggest that there is a security hole in TeamViewer. Therefore it it is important to stress there are no TeamViewer hackers, but rather data thieves that will steal information from other sources. It is critical to make sure attention is not diverted from the real issue.” states the official note released by TeamViewer.

I believe that the explanation provided by the company is plausible due to the recent major breaches, including the one suffered by MySpace and LinkedIn

The company also reaffirmed that its systems are totally secure due to the adoption of adequate security measures.

“TeamViewer is safe to use, because TeamViewer has proper security measures in place including end-to-end encryption to prevent man-in-the-middle attacks, anti-brute-force means, and more.” continues TeamViewer,

TeamViewer urges its users to adopt a strong, unique passwords and enable the two-factor authentication on their accounts. Wait a moment, but I told you before that users reported alleged hack even when the 2FA was enabled.

Another mysterious circumstance is a service outage suffered by TeamViewer on Wednesday, an incident that someone linked to an alleged cyber attack.

Stay Tuned …

If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.

https://www.surveymonkey.com/r/secbloggerwards2016

Thank you

Pierluigi

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – TeamViewer, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.