Here is a thread on it: https://infosec.exchange/@jtig/112689665815283809
- So far “there is no evidence to suggest that the product environment or customer data is affected,” the company says on its website.
- TeamViewer’s internal IT environment is completely independent from its product environment, the firm adds.
[Edit typo.]
Gee, it’s lucky they didn’t start requiring an account for personal use… Oh, wait.
Since they classed my personal account as professional I hope Team Viewer never recovers.
Fuck Russia and their welcoming of hackers, constantly hacking and ransoming shit.
Over and over, fucking scum: https://www.bloomberg.com/news/articles/2024-06-28/cdk-hackers-have-ties-to-notorious-russia-based-cyber-gang?srnd=technology-vp
from companies to city infrastructure to fucking hospitals: https://www.beckershospitalreview.com/cybersecurity/us-hospitals-paid-100m-to-russian-ransomware-hackers.html
https://www.bbc.com/news/technology-60378009
74% of ransomware revenue goes to Russia-linked hackers
https://home.treasury.gov/news/press-releases/jy2114
Russia continues to offer safe harbor for cybercriminals where groups such as LockBit are free to launch ransomware attacks against the United States, its allies, and partners. These ransomware attacks have targeted critical infrastructure, including hospitals, schools, and financial institutions.
RDP for Windows comes built in. VNC has a really fast install on Linux. There’s no reason not to use them and loan your remote sessions to a third party company.
Because TeamViewer will set up a port forwarding and a NAT traversal for you.
VNC and RDP only work when your host has a public IP, or you know how to set up a proxy.
Here we go again…