(no subject)

Date: 2016-06-02 12:39 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
Well, yes, especially because most Teamviewer users are popping themselves into a local Administrator, but they're getting that access by compromising Teamviewer.

(no subject)

Date: 2016-06-03 01:37 am (UTC)
From: [identity profile] nsanity-au.livejournal.com
but they're getting that access by compromising Teamviewer.

There is zero proof of this. So far i've found the following suggested;

1. False flash update that re-writes Teamviewer's ini file.
2. Poisoned Full Client from an unknown - but major - download site (not teamviewer.com).
3. Trojan - http://vms.drweb-av.de/virus/?_is=1&i=8161714
4. Pretty much uniform password re-use and known site hacks with people's emails being listed on https://haveibeenpwned.com/

1 and 2 are fairly bad - but aren't actually compromising Teamviewer. 3 is a generic Trojan that is utilising Teamviewer. 4 is the most likely.

Now that isn't to say Teamviewer's security model is super great - If you have an ID and a Password, you have console access to a PC. If the machine is not locked at idle (or TV Session end) this will give a user access into the server/workstation with the current users credentials/privileges.

I've requested that they remove the requirement for an unattended password, and link it to an Auth'd TV account - and require that the TV account is auth'd via 2FA. This has been taken on board by their feature team (hah!).

Profile

theweaselking: (Default)theweaselking
Page generated Jul. 16th, 2025 08:04 am