No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks

January 21, 2024
in Protection
0
Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks


TeamViewer is software that organizations have long used to enable remote support, collaboration, and access to endpoint devices. Like other legitimate remote access technologies, it is also something that attackers have used with relative frequency to gain initial access on target systems.

Two attempted ransomware deployment incidents that researchers at Huntress recently observed are the latest case in point.

Failed Ransomware Deployment Attempts

The attacks that Huntress flagged targeted two disparate endpoint devices belonging to Huntress customers. Both incidents involved failed attempts to install what appeared to be ransomware based on a leaked builder for LockBit 3.0 ransomware.

Further investigation showed the attackers had gained initial access to both endpoints via TeamViewer. The logs pointed to the attacks originating from an endpoint with the same hostname, indicating the same threat actor was behind both incidents. On one of the computers, the threat actor spent just over seven minutes after gaining initial access via TeamViewer, while on the other, the attacker’s session lasted more than 10 minutes.

Huntress’ report did not say how the attacker might have taken control of the TeamViewer instances in both cases. But Harlan Carvey, senior threat intelligence analyst at Huntress, says that some of the TeamViewer logins appear to be from legacy systems.

“The logs provide no indication of logins for several months or weeks before the threat actor’s access,” he says. “In other instances, there are several legitimate logins, consistent with prior logins — username, workstation name, etc. — shortly before the threat actor’s login.”

Carvey says it is possible that the threat actor was able to purchase access from an initial access broker (IAB), and that the credentials and connection information may have been obtained from other endpoints through the use of infostealers, a keystroke logger, or some other means.

Previous TeamViewer Cyber Incidents

There have been several past incidents where attackers have used TeamViewer in similar fashion. One was a campaign last May by a threat actor looking to install the XMRig cryptomining software on systems after gaining initial access via the tool. Another involved a data exfiltration campaign that Huntress investigated in December. Incident logs showed the threat actor had gained an initial foothold in the victim environment via TeamViewer. Much earlier, Kaspersky in 2020 reported on attacks it had observed on industrial control system environments that involved the use of remote access technologies such as RMS and TeamViewer for initial access.

There have also been incidents in the past — though fewer — of attackers using TeamViewer as an access vector in ransomware campaigns. In March 2016 for instance, several organizations reported getting infected with a ransomware strain called “Surprise” that researchers were later able to tieback to TeamViewer.

TeamViewer’s remote access software has been installed on some 2.5 billion devices since the eponymously named company launched in 2005. Last year, the company described its software as currently running on more than 400 million devices, of which 30 million are connected to TeamViewer at any time. The software’s vast footprint and its ease of use has made it an attractive target for attackers, just like other remote access technology.

How to Use TeamViewer Securely

TeamViewer itself has implemented mechanisms to mitigate the risk of attackers misusing its software to break into systems. The company has claimed that the only way an attacker can access a computer via TeamViewer is if the attacker has the TeamViewer ID and associated password.

“Without knowing the ID and password, it is not possible for others to access your computer,” the company has noted, while listing measures that organizations can take to protect themselves against misuse.

These include:

  • Exiting TeamViewer when the software is not in use;

  • Using the software’s Block and Allow list features to restrict access to specific individuals and devices;

  • Restricting access to certain features for incoming connections;

  • And denying connections from outside the enterprise network.

The company has also pointed to TeamViewer’s support for conditional access policies that allow administrators to enforce remote access rights.

In a statement to Dark Reading, TeamViewer said that most instances of unauthorized access involve a weakening of TeamViewer’s default security settings.

“This often includes the use of easily guessable passwords which is only possible by using an outdated version of our product,” the statement said. “We constantly emphasize the importance of maintaining strong security practices, such as using complex passwords, two-factor-authentication, allow-lists, and regular updates to the latest software versions.” The statement included a link to best practices for secure unattended access from TeamViewer Support.



Editorial Team

Editorial Team

Related Posts

This Heart Rate Monitor Is Widely Regarded As the Best, and It’s 27% Off During Amazon’s Big Spring Sale
Protection

This Heart Rate Monitor Is Widely Regarded As the Best, and It’s 27% Off During Amazon’s Big Spring Sale

March 26, 2026
My Favorite JBL Over-Ear Headphones Are $100 Off During Amazon's Big Spring Sale
Protection

My Favorite JBL Over-Ear Headphones Are $100 Off During Amazon's Big Spring Sale

March 26, 2026
Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It's $140 Off During Amazon's Big Spring Sale
Protection

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It’s $140 Off During Amazon’s Big Spring Sale

March 26, 2026
The Garmin Forerunner 265 Is a Pretty Good Buy During Amazon's Big Spring Sale
Protection

The Garmin Forerunner 265 Is a Pretty Good Buy During Amazon’s Big Spring Sale

March 26, 2026
This Hydrow Rowing Machine Delivers a Full-Body Workout, and It's $300 Off for Amazon's Big Spring Sale
Protection

This Hydrow Rowing Machine Delivers a Full-Body Workout, and It's $300 Off for Amazon's Big Spring Sale

March 26, 2026
What Happens Now That Meta and YouTube Were Found Legally Negligent
Protection

What Happens Now That Meta and YouTube Were Found Legally Negligent

March 26, 2026
Load More
Next Post
No signs of panic as Nikola gets 2nd Nasdaq delisting warning

No signs of panic as Nikola gets 2nd Nasdaq delisting warning

Popular News

  • Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    0 shares
    Share 0 Tweet 0
  • BlackRock’s Fink on why he won’t cash out private-credit investors: ‘Those are the rules, live with it.’

    0 shares
    Share 0 Tweet 0
  • How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • SC Lowy to launch interval fund amid private credit pivot

    0 shares
    Share 0 Tweet 0
  • Epstein’s Alleged Bitcoin, Crypto Investments Surface In Newly Released DOJ Files

    0 shares
    Share 0 Tweet 0

Latest News

XRP USD Price Outlook: Ripple Fails to Breach $1.60, What Next?

XRP USD Price Outlook: Ripple Fails to Breach $1.60, What Next?

March 26, 2026
0

XRP USD is clinging to a narrow ledge. The token trades near $1.38 as of late March 2026, down roughly...

Global oil prices near $100 as Iran war nears one-month mark

Global oil prices near $100 as Iran war nears one-month mark

March 26, 2026
0

Oil prices climbed on Thursday as the war in Iran approaches its one-month mark, with little sign of an end...

An older relative wants to give my daughter $19,000 when she turns 18. I said no. Who’s right?

An older relative wants to give my daughter $19,000 when she turns 18. I said no. Who’s right?

March 26, 2026
0

“We don’t think it’s healthy for very young adults to have access to large sums of money without working for...

Dogecoin

Dogecoin ETFs Dead In March? Only 2 Days Of Inflows And Less Than $1M – Details

March 26, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure When the Dogecoin Exchange-Traded Funds (ETFs) were...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.