TeamViewer Investigation Points To Reused Login Credentials From Hacked Websites

Some people may remember the TeamViewer hack, which affected several thousand users. Some people even complained about money being stolen from their PayPal account in the process. As it turns out, most of the affected users are to blame for this debacle, as they reused passwords.

TeamViewer Still Denies Allegations

Reusing a password in this day and age is asking for trouble, unfortunately. The TeamViewer hack got a lot of attention, even though the company continues to deny allegations of their services being hacked. Instead, they blame users for reusing passwords obtained through other hacked platforms, such as LinkedIn or MySpace.

While it is difficult to prove who is to blame for this breach, the explanation by TeamViewer sounds plausible. Moreover, the company implemented some new security features to ensure these attacks would not happen again in the future. Even if users reuse an old password, the software will send an email to the user, and ask for permission to approve or deny these requests.

Although there is an argument to be made as to how this solution comes after the facts, it is still positive to see TeamViewer acknowledge the problems. Checking the GPS coordinates of login attempts is another added security feature. This one is particularly interesting, as it should give users a clear idea as to where their account is being accessed from.



Related Post

It is worth noting TeamViewer decided to investigate this breach a bit further, as they came across the list of leaked passwords from other platforms. After cross-referencing some data, it turns out several users did indeed reuse their passwords. Since the assailants also had access to user email addresses – which were also reused – it did not take much effort to cause a massive wave of hacking attacks.

One topic that still needs clarification is whether or not users with 2FA enabled were hacked as well. TeamViewer advised all affected users to upload their log files so the company can continue their investigation. Mainly users who claim to have had 2FA enabled should send over their records. The company does not exclude the possibility something went wrong with this level of security, but they want to form a full timeline of the events first.

Image credit 1

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Pi Coin Price Stalls Below $0.78, Ondo Finance Market Cap Crosses $3B, Unstaked Rises as Fastest Growing Crypto 2025

Pi Coin Price Battles $0.78, Ondo Finance Market Cap Reclaims $3B, Unstaked Races Ahead as…

23 hours ago

Cold Wallet vs MetaMask: The Privacy-First Crypto Wallet Redefining Control

Cold Wallet’s $CWT Set for 4,900% ROI While Polkadot and Sui Fuel Altcoin Season Comeback…

23 hours ago

Web3 ai Projects 1747% ROI as HBAR Faces Resistance and TRX Climbs

Hedera Tests Key Resistance While Tron Climbs and Web3 ai Projects 1747% ROI as the…

24 hours ago

PEPE Set for Breakout, BlockDAG’s 90% Rollback Fires Up $218.5M Presale! MANTRA’s Big Move

PEPE Set for Breakout, MANTRA Burns 300M Tokens, But BlockDAG’s 90% Rollback Is the Real…

24 hours ago

Ethena Labs Transforms into Institutional DeFi Powerhouse Amid Expanding Product Suite

Once known just as a synthetic dollar provider in the DeFi world, Ethena Labs is…

1 day ago

$SUI Surges 60% in One Week as Ecosystem Activity Explodes

In a striking display of momentum, $SUI's price has rocketed upward by 60% over the…

1 day ago