June 28, 2024 at 02:27AM
TeamViewer detected an “irregularity” in its internal IT environment on June 26, 2024. The company immediately activated a response team and began investigations with cyber security experts. It stated that no customer data was impacted and an investigation is ongoing. The U.S. Health-ISAC issued a bulletin about threat actors’ exploitation of TeamViewer.
Key takeaways from the meeting notes:
– TeamViewer detected an “irregularity” in its internal corporate IT environment on June 26, 2024 and has activated a response team and procedures to address the incident. Investigations and remediation measures are underway.
– The company stated that its corporate IT environment is isolated from the product environment and there is no evidence of customer data being impacted.
– The U.S. Health Information Sharing and Analysis Center (Health-ISAC) issued a bulletin about threat actors’ active exploitation of TeamViewer, specifically mentioning APT29, a state-sponsored threat actor affiliated with the Russian Foreign Intelligence Service, as responsible for the exploitation.
– APT29 has been linked to breaches of Microsoft and Hewlett Packard Enterprise (HPE).
– Microsoft reported that some customer email inboxes were accessed by APT29 following a hack earlier this year.
These are the key points summarized from the meeting notes for your reference.