TeamViewer has been all over the news in the last few days with “significant” numbers of TeamViewer clients expressing/venting on Reddit, Twitter and other social media channels. TeamViewer has denied that there has been a breach of their systems and instead has pointed to “mega-breaches” of social networks and users using the same account credentials across multiple platforms. Coincidentally, Foregenix has recently completed a case study involving compromised TeamViewer credentials.
A leading footwear retailer in South Africa contacted Foregenix recently to assist with more specialized monitoring of their Point of Sale Systems – the reason being that they had become concerned about the numbers of merchants with integrated Point of Sale (POS) systems being hacked in South Africa, resulting in significant fraud losses and penalties from the card schemes. With alerts regularly coming out from their acquiring bank, they decided to enlist the assistance of the Foregenix team to help monitor their payment systems.
Interestingly enough within two weeks of deploying Serengeti IR, our team picked up unusual activity on one of the POS systems – sure enough the client’s TeamViewer account had
Needless to say it was the first confirmed TeamViewer account compromise to come across our team (there have been a few other suspected "smoking guns", but none have been proven conclusively to be as a result of TeamViewer credentials being compromised) – and we suspect it will not be the last. If you use Team Viewer in your business, we would advise implementing two-factor authentication and to implement other appropriate controls for your business – as outlined in the TeamViewer blog.
If you would like to read a bit more about the above attack, please download our case study.