Topics
Latest
AI
Amazon
Image Credits:Andreas Arnold / Getty Images
Apps
Biotech & Health
Climate
Cloud Computing
Department of Commerce
Crypto
initiative
EVs
Fintech
Fundraising
Gadgets
punt
Government & Policy
ironware
Layoffs
Media & Entertainment
Meta
Microsoft
privateness
Robotics
Security
Social
place
startup
TikTok
transport
Venture
More from TechCrunch
Events
Startup Battlefield
StrictlyVC
Podcasts
video
Partner Content
TechCrunch Brand Studio
Crunchboard
Contact Us
TeamViewer , the company that makes widely used remote memory access tools for companies , has substantiate an ongoing cyberattack on its corporate meshwork .
Ina program line Friday , the company attributed the via media to government activity - endorse hackers operate for Russian intelligence , known as APT29 ( and Midnight Blizzard ) .
The Germany - based company said its investigation so far point to an initial intrusion on June 26 “ attach to credentials of a standard employee news report within our corporate IT environment . ”
TeamViewer said that the cyberattack “ was contained ” to its corporate net and that the company keep its internal electronic web and customer system separate . The company tote up that it has “ no grounds that the menace actor gained entree to our product environs or client datum . ”
Martina Dier , a interpreter for TeamViewer , declined to answer a series of questions from TechCrunch , including whether the ship’s company has the technical ability , such as logs , to determine what , if any , data was access or exfiltrated from its web .
TeamViewer is one of the more popular provider of distant access cock , allowing its collective customers — include transport elephantine DHL and beverage Lord Coca - Cola , per its website — to access other devices and information processing system over the net . The companysays it has more than 600,000 paying customersand facilitates removed access to more than 2.5 billion devices around the world .
TeamViewer is alsoknown to be maltreat by malicious hackersfor its power to be used to remotely plant malware on a dupe ’s equipment .
Join us at TechCrunch Sessions: AI
Exhibit at TechCrunch Sessions: AI
It ’s not known how the TeamViewer employee ’s credentials were compromised , and TeamViewer did not say .
The U.S. government activity and security measure researchers have long attributed APT29 to hacker work out for Russia ’s foreign intelligence agency service , the SVR . APT29 is one of the more haunting , well - resourced government - back hacking groups , and is screw for its use of goods and services of simple but efficacious hacking proficiency — include stealing passwords — to carry long - course furtive espionage campaigns that swear on slip sensitive data point .
TeamViewer is the latest tech company targeted by Russia ’s SVR of late . The same radical of government hackers compromised Microsoft ’s embodied internet earlier this year tosteal emails from top executive to learn what was have sex about the intruding hackers themselves . Microsoft saidother tech companies were compromisedduring the on-going Russian espionage military campaign , and U.S. cybersecurity authority CISA confirmedfederal government email hosted on Microsoft ’s cloudwere also stolen .
Months afterwards , Microsoft said it was struggle to expel the hackers from its system , calling the campaign a “ sustained , significant dedication ” of the Russian government ’s “ resource , coordination , and focus . ”
The U.S. governing also blamed Russia ’s APT29for the 2019 - 2020 espionage military campaign place U.S. software firm SolarWinds . The cyberattack saw the mass - hacking of U.S. federal government authority by direction of planting a hidden malicious backdoor in SolarWinds ’ flagship software . When the tainted software package update was push out to SolarWinds ’ customers , theRussian hack had access to every internet running the compromised computer software , including the Treasury , Justice Department and the Department of State .
Do you know more about the TeamViewer cyberattack ? Get in touch . To adjoin this reporter , get in touching on Signal and WhatsApp at +1 646 - 755 - 8849 , orby email . You also can send files and documents viaSecureDrop .