Re: TeamViewer hack/breach
Posted: Sat Jun 04, 2016 12:51 pm
Saw this earlier today on another forums site i look at.
The general consensus there was that it was a case of non-tech savvy users committing a password recycling U53R error.
There have been alot of website breaches and leaks over the past year and its very likely there is a massive password list + relational data for all these users.
The free webhosting service 000webhost was rooted if i remember correctly (idiots ran a version of SQL/PHP that was vulnerable to heartbleed on their free services months after it was reported)
Which means that all the stored client information (and the information of those client's clients) would have been leaked + sold and enumerated into password lists.
That or teamviewer has been hacked to the point where its 2sta is completely bypassed (seeds known) and they have 0 idea about how its happening.
Now whats more likely, users of teamviewer RA tool who arent the cream of the crop in terms of tech smarts recycling passwords for their email account (how 2sta is been bypassed) and other services, or a million dollar tech company been compromised so badly they dont even know how its happened/have any internal logs of the compromise/un-authorised access??
The general consensus there was that it was a case of non-tech savvy users committing a password recycling U53R error.
There have been alot of website breaches and leaks over the past year and its very likely there is a massive password list + relational data for all these users.
The free webhosting service 000webhost was rooted if i remember correctly (idiots ran a version of SQL/PHP that was vulnerable to heartbleed on their free services months after it was reported)
Which means that all the stored client information (and the information of those client's clients) would have been leaked + sold and enumerated into password lists.
That or teamviewer has been hacked to the point where its 2sta is completely bypassed (seeds known) and they have 0 idea about how its happening.
Now whats more likely, users of teamviewer RA tool who arent the cream of the crop in terms of tech smarts recycling passwords for their email account (how 2sta is been bypassed) and other services, or a million dollar tech company been compromised so badly they dont even know how its happened/have any internal logs of the compromise/un-authorised access??