[URGENT] TeamViewer Database Compromised

Discussion in 'Off-Topic' started by Sean, Jun 3, 2016.

  1. Sean
    Offline

    Sean Senior Member

    Joined:
    Sep 23, 2012
    Messages:
    4,597
    TeamViewer has been hacked. They are denying everything and pointing fingers at the users. : technology

    Here's a few tips to help secure your computer.

    1) Run a malwarebytes anti-malware scan as soon as you can.

    2) If you have Teamviewer installed, uninstall it and change your password/delete your account. There are plenty of other programs to use instead. A lot are listed in the Reddit link at the top of this thread.

    3) Change all important account passwords.
    • Bank
    • PayPal
    • Amazon
    • eBay
    • Facebook (I know it sounds silly but a lot of websites use Facebook as a way to log in or create an account)
    4) Activate two factor authentication on all applicable accounts.
    I hope this helps and protects a lot of you so that way you don't have to deal with the same stuff I'm currently going through.
     
  2. user59306
    Offline

    user59306 Experienced Member

    Joined:
    Apr 17, 2013
    Messages:
    567
    Oh, good to know
     
  3. blaq
    Offline

    blaq Experienced Member

    Joined:
    Jun 17, 2013
    Messages:
    4,625
    With TeamViewer denying that they've lost any users' data, we can only infer that:
    1) They lost users' data and are denying it
    2) They didn't actually lose users' data

    The only 2 reputable news sources (theregister and ZDNet) that I could find reporting on the story both are hesitant to blame TeamViewer. Nonetheless, what Sean said holds true.

    1) Running AV Scans: If possible, the affected OS needs to be not booted when scanning, to ensure maximum possibility of finding viruses. The easiest way is to unplug the Hard Disk from the affected machine, put it into an external USB caddy, and plug it into a known good computer, running the scan from there. Alternatively, one can boot into another OS like a BartPE or *Nix enviroment and run the scan from there (Bootdisk.Com)

    2) Any program which uses the concept of a 3rd party server to perform the connection (NAT Traversal) is vulnerable to such a man-in-the-middle attack. Essentially, the only way to prevent these attacks is to use a point to point connection, like running an OpenVPN on your network. However, this is complicated because most people don't have static IPs or don't know how to configure port forwarding, which is why a 3rd party service is needed to perform the initial connection. For those interested, here's how you can get started for cheap (Roll Your Own VPN with a Raspberry Pi and OpenVPN)

    3) 2 Factor Authentication for PayPal, Banks etc will absolutely stop this attack dead in it's tracks. Simply, it is _much_ harder for hackers to compromise both your phone and your computer, so if you recieve an SMS that contains a 6 digit PayPal 1-time code that you didn't ask for, you can be pretty sure that someone has attempted to log into your account without your authorisation.
     
  4. Eleanora
    Offline

    Eleanora Experienced Member

    Joined:
    Jan 9, 2016
    Messages:
    823
    Oi I need to tell my uncle
     

Share This Page