Teamviewer Discloses Investigation Update Following Cyber Attack
TeamViewer, the realm chief in far away connectivity alternatives, has provided an update on the cyber assault detected on June 26, 2024.
The firm has concluded the indispensable incident response and investigation half, confirming that the breach used to be contained in its internal company IT ambiance.
Data Integrity Secured
Eight days after the initial detection of the cyber security incident, TeamViewer, in collaboration with leading cyber security consultants from Microsoft, has reconfirmed that the assault did no longer occupy an stamp on its product ambiance, connectivity platform, or any buyer knowledge.
This assurance comes as a relief to hundreds and hundreds of users who depend on TeamViewer’s machine for obtain far away access and toughen.
The firm says, “These findings verify that our machine alternatives occupy always been obtain to use. We adore our prospects’ persevered belief in our merchandise, security posture, and incident response capabilities.”
Safety Measures and Response
TeamViewer’s swift response to the incident enthusiastic on the spot remediation measures and the establishment of extra safety layers.
The firm reports no suspicious activity in its internal company IT ambiance on tale of the assault used to be blocked.
The investigation published that the possibility actor leveraged a compromised employee tale to access the within company IT ambiance.
The attackers copied employee itemizing knowledge, including names, company contact knowledge, and encrypted employee passwords.
Then again, Microsoft’s cyber security consultants occupy mitigated the possibility connected to these encrypted passwords.
TeamViewer has since hardened its employee authentication procedures and performed stronger safety layers.
The firm has also rebuilt its internal company IT ambiance to be sure that a truly relied on mumble.
No matter concluding the indispensable investigation half, TeamViewer remains vigilant.
The firm displays the realm closely and maintains a mighty security posture.
“Safety remains core to our DNA, and we can proceed to speculate in our most productive-in-class cyber security posture as we’ve got carried out today,” the commentary reads.
Timeline of Events
June 26, 2024: TeamViewer’s security team detected an irregularity in the within company IT ambiance. Instant response measures were activated, and investigations started with the assistance of globally wisely-known cybersecurity consultants.
June 27, 2024: TeamViewer confirmed that the assault used to be contained all the way by the corporate IT ambiance and did no longer occupy an stamp on the product ambiance or buyer knowledge. The firm attributed the activity to the possibility actor identified as APT29 / Dull night Blizzard.
June 28, 2024: Extra investigations reconfirmed that the assault used to be little to the within company IT ambiance. TeamViewer persevered to work with cyber security consultants and relevant authorities to counterpoint the aloof evidence.
June 30, 2024: TeamViewer reconfirmed that the assault did no longer contact the product ambiance, connectivity platform, or buyer knowledge. The firm knowledgeable workers and relevant authorities and started rebuilding the within company IT ambiance.
July 4, 2024: TeamViewer concluded the indispensable incident response and investigation half, confirming that the incident used to be contained in the within company IT ambiance. The firm assured prospects that its machine alternatives remained obtain to use all the way by the incident.
TeamViewer’s transparent verbal replace and swift response to the cyber assault occupy demonstrated its commitment to security.
The firm’s proactive measures and collaboration with leading cybersecurity consultants occupy ensured the integrity of its programs and the safety of buyer knowledge.
As TeamViewer continues to display screen the realm, prospects can remain assured in the security of the firm’s far away connectivity alternatives.
Source credit : cybersecuritynews.com