Teamviewer, a German cloud company, confirmed a cyberattack attributed to the Russian hacking group APT29, also known as Cozy Bear and Midnight Blizzard. The attack involved credentials of a standard employee account within Teamviewer's Corporate IT environment. Although the attack was reportedly contained within Teamviewer's internal corporate IT environment without affecting the product environment or customer data, the implications of such a breach by a sophisticated state-backed actor are concerning due to potential access to sensitive corporate information and the risk of further undisclosed exploits.
Source: https://www.wired.com/story/google-face-recognition-office-safety-security-roundup/
TPRM report: https://scoringcyber.rankiteo.com/company/teamviewer
"id": "tea001070924",
"linkid": "teamviewer",
"type": "Cyber Attack",
"date": "6/2024",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'industry': 'Technology',
'location': 'Germany',
'name': 'Teamviewer',
'type': 'Cloud company'}],
'attack_vector': 'Compromised credentials',
'data_breach': {'sensitivity_of_data': 'Sensitive corporate information'},
'description': 'Teamviewer, a German cloud company, confirmed a cyberattack '
'attributed to the Russian hacking group APT29, also known as '
'Cozy Bear and Midnight Blizzard. The attack involved '
'credentials of a standard employee account within '
"Teamviewer's Corporate IT environment. Although the attack "
"was reportedly contained within Teamviewer's internal "
'corporate IT environment without affecting the product '
'environment or customer data, the implications of such a '
'breach by a sophisticated state-backed actor are concerning '
'due to potential access to sensitive corporate information '
'and the risk of further undisclosed exploits.',
'impact': {'data_compromised': 'Potential access to sensitive corporate '
'information',
'systems_affected': "Teamviewer's internal corporate IT "
'environment'},
'initial_access_broker': {'entry_point': 'Standard employee account '
'credentials'},
'motivation': 'Potential access to sensitive corporate information',
'response': {'containment_measures': "Contained within Teamviewer's internal "
'corporate IT environment'},
'threat_actor': ['APT29', 'Cozy Bear', 'Midnight Blizzard'],
'title': 'Cyberattack on Teamviewer by APT29',
'type': 'Cyberattack',
'vulnerability_exploited': 'Standard employee account credentials'}