Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks

Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks

January 19, 2024 at 04:48PM

TeamViewer is widely used by organizations for remote support and access. However, attackers have exploited it for ransomware deployment. Huntress reported two failed attempts involving initial access via TeamViewer. Past incidents also show TeamViewer’s misuse. TeamViewer has security measures, but incidents often result from weak security practices. The company recommends secure usage measures.

It seems that the meeting notes are discussing recent attempted ransomware deployments observed by Huntress, involving the use of TeamViewer to gain initial access to endpoint devices. The attacks were linked to the use of a leaked builder for LockBit 3.0 ransomware, and it was noted that some of the TeamViewer logins appear to be from legacy systems.

It was also emphasized that some of the attacks may have involved the purchase of access from an Initial Access Broker (IAB), and the potential use of infostealers or keystroke loggers to obtain credentials and connection information.

The meeting notes further highlight previous incidents where attackers have misused TeamViewer for malicious purposes, as well as the measures that TeamViewer itself has implemented to mitigate the risk of misuse, such as conditional access policies and support for secure unattended access.

In summary, the meeting notes provide valuable insights into the security challenges associated with the use of TeamViewer and the potential risks of unauthorized access, as well as the steps that organizations can take to protect themselves against misuse.

If you have specific actions or follow-up points pertaining to these meeting notes, feel free to let me know, and I’d be happy to assist further.

Full Article