http://arstechnica.com/security/2016/06/teamviewer-says-theres-no-evidence-of-2fa-bypass-in-mass-account-hack/
>TeamViewer confirms number of hacked user accounts is “significant”
>Investigation continues to show external password breaches are cause, spokesman says.
Anybody get hit by this (e.g. unauthorized access)? Did you stop using Teamviewer, or are you still using it?
knowingly installing a RAT.
>welcome to ze botnet
>>54941712
Never used it, vnc masterrace.
>>54941769
>using RDP on your Windows server? le botnet
That is some stupid shit, anon.
>>54941779
>windows
>server
yep.
>>54941712
Why is it teamviewer's fault for users having shit security practices?
Literally not their fault.
>>54941790
Some users have insisted they have had good passwords and 2FA enabled and still got hit, but then they provide no proof to the community or TV as a company (for the latter, this is what the company alleges).
There's also some insecure defaults in the tool - the default join code is a 9 digit machine ID and a four digit PIN that rotates every minute that could theoretically be bruteforced. This can be easily changed but that's the default in the server.
Some users believe/allege that the actual problem was a compromise on the server side by hackers, which would mean passwords would become irrelevant to establishing sessions (unless you enabled the secondary option of per machine passwords, which are not stored on Teamviewer servers).