My group at work is spread all over the country, and we make use of TeamViewer, so I was concerned by a recent...
malware attack against the tool. Could you explain what the malware attacks and whether TeamViewer security risk is too great to still safely use it for sensitive communications? Also, is there any way to tell if sensitive information was previously captured by this malware?
Ask the Expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous)
The TeamSpy malware is installed when a user downloads a malicious DLL packaged with the remote administration tool TeamViewer. TeamSpy uses a command-and-control infrastructure along with TeamViewer to control and monitor infected endpoints. This malware is similar to other malware strains used for monitoring or capturing sensitive data, with the twist that it uses the TeamViewer software as part of the monitoring. Keep in mind that the malware is essentially an illegitimate version of TeamViewer, so it is important to download the software from trusted sources to reduce the security risk posed by TeamViewer. TeamViewer recently released a new version featuring security updates, so enterprises using the product should download and implement the new version as soon as possible.
Unfortunately it is often difficult to determine conclusively whether malware has accessed sensitive info. If the data was stored on the system and the user had access to the data or entered data on the system, then the malware could have accessed that data. Depending on whether the malware had keystroke logger functionality (in the case of TeamSpy, once an attacker gained control of a target machine using TeamViewer, he or she could easily install additional malware), user keystrokes may have been captured. If the malware was able to capture accessed data, it is possible the malware captured the data and sent it to an external system. To identify whether any data was accessed or saved by attackers, you could analyze the local file system for new or modified files; but unfortunately, it is fairly easy to change the times on files if this functionality is included in the malware.
A network forensics tool that captures all network traffic sent outside of the network could help determine if data was sent from a system, if the data sent wasn't encrypted or how much data was sent from the compromised endpoint. This is a fairly resource-intensive method of tracking whether data was sent from a compromised system, but it does provide a more reliable picture than would otherwise be available.
Dig Deeper on Secure remote access
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading