(no subject)

Date: 2016-06-02 12:14 am (UTC)
From: [identity profile] skington.livejournal.com
Hold on. Teamviewer's FAQ says that you can access a machine remotely with a username and password (https://www.teamviewer.com/en/help/422-How-can-I-restrict-access-for-TeamViewer-connections-to-my-computer). And people are saying that they got compromised with a password they'd only ever used once. Does that mean Teamviewer was storing passwords in the clear?

(no subject)

Date: 2016-06-02 12:35 am (UTC)
From: [identity profile] theweaselking.livejournal.com
Possible, OR they were storing passwords encrypted but insecurely, OR their protocol was compromised and someone bypassed authentication, OR someone managed to get a sniffer in to see the passwords as they went by, either because they were insecurely encrypted on the wire or by reading them right out of memory on a compromised auth server, OR....

There's a bunch of things that might have happened to explain WHY. More important is the WHAT: Teamviewer users are getting their machines pwnt and their stored passwords, saved credentials, and live sessions stolen, and having ransomware installed.

(no subject)

Date: 2016-06-02 06:36 am (UTC)
From: [identity profile] nsanity-au.livejournal.com
If you have console access to a machine - self-escalation to admin rights to do whatever you want is pretty trivial.

(no subject)

Date: 2016-06-02 12:39 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
Well, yes, especially because most Teamviewer users are popping themselves into a local Administrator, but they're getting that access by compromising Teamviewer.

(no subject)

Date: 2016-06-03 01:37 am (UTC)
From: [identity profile] nsanity-au.livejournal.com
but they're getting that access by compromising Teamviewer.

There is zero proof of this. So far i've found the following suggested;

1. False flash update that re-writes Teamviewer's ini file.
2. Poisoned Full Client from an unknown - but major - download site (not teamviewer.com).
3. Trojan - http://vms.drweb-av.de/virus/?_is=1&i=8161714
4. Pretty much uniform password re-use and known site hacks with people's emails being listed on https://haveibeenpwned.com/

1 and 2 are fairly bad - but aren't actually compromising Teamviewer. 3 is a generic Trojan that is utilising Teamviewer. 4 is the most likely.

Now that isn't to say Teamviewer's security model is super great - If you have an ID and a Password, you have console access to a PC. If the machine is not locked at idle (or TV Session end) this will give a user access into the server/workstation with the current users credentials/privileges.

I've requested that they remove the requirement for an unattended password, and link it to an Auth'd TV account - and require that the TV account is auth'd via 2FA. This has been taken on board by their feature team (hah!).

(no subject)

Date: 2016-06-02 06:34 am (UTC)
From: [identity profile] nsanity-au.livejournal.com
this is old as shit.

People have been suggesting that TV has been hacked for about 3 months now. They responded previously with the following;

https://www.teamviewer.com/en/company/press/statement-on-potential-teamviewer-hackers/

It reads as pretty arrogant, but they are German - so you can lose that message.

FWIW I have ~1400 endpoints covered by Teamviewer, and have been a TV user since 5 (we're upto 11 now). We've not seen any contact requests or evidence of rogue TV hackings.

Thats not to say its not possible - but certainly there isn't enough evidence to say they've been hacked - not to mention yesterdays problem was a result of DNS fuckery, not a hack.,

Note: I will whinge about TV to the high hell - I have problems almost daily with its client dying and not allowing remote connection on certain machines, requiring for the agent to be reset.before you can initiate remote support again. But i've got no solid evidence in my patch they've been hacked.
Edited Date: 2016-06-02 06:36 am (UTC)

(no subject)

Date: 2016-06-02 12:43 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
If "DNS fuckery" results in more than 800 people on one Subreddit alone reporting malware installs, compromised passwords, and emptied bank accounts? That's still a hack.

(no subject)

Date: 2016-06-02 09:48 pm (UTC)
From: [identity profile] nsanity-au.livejournal.com
Teamviewer have repeatedly said that its weak/re-used accounts in every support case - and again like i said, this has been building for about 3 months.

And like I said - I haven't seen it across ~1400 endpoints we use from an MSP perspective.

TV - or any RMM tool really - would be an excellent choice to do this kind of thing.

Reddit detectives are go - https://www.reddit.com/r/sysadmin/comments/4m8o7i/im_86ing_teamviewer_via_gpo_maybe_you_will_find/d3tin1o
Edited Date: 2016-06-02 09:49 pm (UTC)

Profile

theweaselking: (Default)theweaselking
Page generated Jul. 10th, 2025 01:54 am