{"id":228122,"date":"2024-06-28T19:52:07","date_gmt":"2024-06-28T19:52:07","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=228122"},"modified":"2024-06-28T19:52:07","modified_gmt":"2024-06-28T19:52:07","slug":"hackerii-rusi-au-spart-reteaua-corporate-a-teamviewer-una-dintre-cele-mai-populare-aplicatii-globale-de-acces-la-distanta-a-computerelor-compania-sustine-ca-datele-clientilor-nu-sunt-compromise","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=228122","title":{"rendered":"Hackerii ru\u015fi au spart re\u0163eaua corporate a TeamViewer, una dintre cele mai populare aplica\u0163ii globale de acces la distan\u0163\u0103 a computerelor. Compania sus\u0163ine c\u0103 datele clien\u0163ilor nu sunt compromise"},"content":{"rendered":"<p>\nFurnizorul de software de acces de la distan\u0163\u0103 TeamViewer avertizeaz\u0103 c\u0103 re\u0163eaua sa corporate a fost spart\u0103 \u00eentr-un atac cibernetic, scrie presa interna\u0163ional\u0103. &#8220;Miercuri, 26 iunie 2024, echipa noastr\u0103 de securitate a detectat o neregul\u0103 \u00een mediul IT corporativ intern al TeamViewer&#8221;, a anun\u0163at TeamViewer. &#8220;Ne-am activat imediat echipa \u015fi procedurile de r\u0103spuns, am \u00eenceput investiga\u0163iile \u00eempreun\u0103 cu o echip\u0103 de exper\u0163i \u00een securitate cibernetic\u0103 de renume mondial \u015fi am implementat m\u0103surile de remediere necesare&#8221;. Compania sus\u0163ine c\u0103 datele clien\u0163ilor nu au fost afectate. &#8220;Mediul IT corporativ intern al TeamViewer este complet independent de mediul produsului. Nu exist\u0103 nicio dovad\u0103 care s\u0103 sugereze c\u0103 mediul produsului sau datele clien\u0163ilor sunt afectate. Investiga\u0163iile sunt \u00een curs de desf\u0103\u015furare, iar obiectivul nostru principal r\u0103m\u00e2ne asigurarea integrit\u0103\u0163ii sistemelor noastre.&#8221;<\/p>\n<p>\nCompania spune c\u0103 inten\u0163ioneaz\u0103 s\u0103 fie transparent\u0103 \u00een ceea ce prive\u015fte \u00eenc\u0103lcarea \u015fi va actualiza \u00een permanen\u0163\u0103 stadiul investiga\u0163iei sale pe m\u0103sur\u0103 ce vor fi disponibile mai multe informa\u0163ii, noteaz\u0103 portalul bleepingcomputer.com. TeamViewer este un software de acces de la distan\u0163\u0103 foarte popular care le permite utilizatorilor s\u0103 controleze de la distan\u0163\u0103 un computer \u015fi s\u0103 \u00eel utilizeze ca \u015fi cum ar sta \u00een fa\u0163a dispozitivului. Compania spune c\u0103 produsul s\u0103u este utilizat \u00een prezent de peste 640.000 de clien\u0163i din \u00eentreaga lume \u015fi a fost instalat pe peste 2,5 miliarde de dispozitive de la lansarea companiei. De\u015fi TeamViewer afirm\u0103 c\u0103 nu exist\u0103 nicio dovad\u0103 c\u0103 mediul produsului s\u0103u sau datele clien\u0163ilor au fost compromise, utilizarea sa masiv\u0103 at\u00e2t \u00een mediile consumatorilor, c\u00e2t \u015fi \u00een mediile corporate face ca orice bre\u015f\u0103 s\u0103 reprezinte o preocupare semnificativ\u0103.<\/p>\n<p>\nCompania a anun\u0163at vineri c\u0103 nu are date care s\u0103 arate c\u0103 datele clien\u0163ilor au fost compromise \u015fi a men\u0163ionat c\u0103 datele arat\u0103 c\u0103 atacatorii sunt afilia\u0163i unei grup\u0103ri care lucreaz\u0103 cu serviciile de informa\u0163ii din Rusia.<\/p>\n<p>\n\u201eRezultatele actuale ale investiga\u0163iei indic\u0103 un atac care a avut loc miercuri, 26 iunie, legat de datele de identificare ale unui cont standard de angajat din cadrul mediului nostru IT corporativ. Pe baza monitoriz\u0103rii continue a securit\u0103\u0163ii, echipele noastre au identificat un comportament suspect al acestui cont \u015fi au pus imediat \u00een aplicare m\u0103suri de r\u0103spuns la incident. \u00cempreun\u0103 cu partenerul nostru extern cu care am lucrat la r\u0103spunsul pentru incident, atribuim \u00een prezent aceast\u0103 activitate actorului de amenin\u0163are cunoscut sub numele de APT29 \/ Midnight Blizzard. Pe baza concluziilor actuale ale investiga\u0163iei, atacul a fost limitat la mediul IT corporativ \u015fi nu exist\u0103 nicio dovad\u0103 c\u0103 actorul amenin\u0163\u0103rii a ob\u0163inut acces la mediul nostru de produse sau la datele clien\u0163ilor.\u201d<\/p>\n<p>\n<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compania a anun\u0163at vineri c\u0103 nu are date care s\u0103 arate c\u0103 datele clien\u0163ilor au fost compromise \u015fi a men\u0163ionat c\u0103 datele arat\u0103 c\u0103 atacatorii sunt afilia\u0163i unei grup\u0103ri care lucreaz\u0103 cu serviciile de informa\u0163ii din Rusia.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[238,263,4126,272,10781,14785,10287,80,7543,19976,13244,13719],"class_list":["post-228122","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-acces","tag-aplicatii","tag-clienti","tag-companie","tag-computere","tag-hackeri","tag-mediu","tag-refuz","tag-retea","tag-rusi","tag-spargere","tag-sustinere"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/228122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=228122"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/228122\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=228122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=228122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=228122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}