


On the other hand, users with strong, unique passwords were also compromised. When this password is breached, an outsider can take over machines that are under remote control. The people who have access to remote machines could have used weak passwords, or re-used passwords to have ease-of-use while logging in. The official answer from TeamViewer is ‘no’. But does this mean TeamViewer was hacked? Users of TeamViewer saw the TeamViewer-box pop-up, saw their mouse move and even noticed payments were completed through eBay or PayPal accounts, without the consent of the user behind the keyboard. The hack means that everyone who has the solution installed, needs to either change their password, access-code, and needs to see if unwanted payments have been done. A TeamViewer spokesman speaking with Arstechnica said that ‘the number of takeovers was “significant,” but he continued to maintain that the compromises are the result of user passwords that were compromised through a cluster of recently exposed megabreaches.’ Some users, however, also reported breaches even when 2FA was used, but TeamViewer is said to have investigated these instances when log files were provided and found no evidence of 2FA being breached. In the past days there were news posts saying the widely used remote control solution TeamViewer had been breached.
