Threat Intelligence

TeamViewer Hack — What You Need to Know and What to Do

> incident_detected 2024-06-26 —— actor: APT29/Midnight Blizzard —— vector: compromised employee credentials<span class="cursor-blink">_</span>_

Hedgehog Security 14 January 2025 14 min read
teamviewer apt29 midnight-blizzard breach remote-access supply-chain incident-response

Russia's SVR inside TeamViewer's corporate network.

On 26 June 2024, TeamViewer's internal security team detected an irregularity in the company's corporate IT environment. What followed was a rapid investigation, conducted alongside Microsoft's incident response team, that confirmed a breach attributed to APT29 — also tracked as Midnight Blizzard, Cozy Bear, and Nobelium — the cyber espionage arm of Russia's Foreign Intelligence Service (SVR). The attackers had gained access using compromised credentials belonging to a standard employee account, moved through the corporate IT environment, and exfiltrated employee directory data including names, corporate contact information, and encrypted passwords.

TeamViewer is not a niche product. It is installed on over 2.5 billion devices worldwide. It is used by more than 640,000 subscribers across logistics, technology, finance, healthcare, and manufacturing. When a remote access platform of this scale is breached by a state-sponsored threat group known for patient, intelligence-driven operations, every organisation that deploys TeamViewer — or permits its use — needs to understand what happened, assess their exposure, and take immediate action.

Immediate Actions Required

If your organisation uses TeamViewer: change your TeamViewer account password immediately, enable two-factor authentication if not already active, ensure you are running the latest version with current security updates, review your access logs for any unusual remote desktop activity — particularly around the dates of 26 June to 4 July 2024 — and exercise heightened caution with any emails purporting to come from TeamViewer.


How the incident unfolded.

TeamViewer disclosed the breach incrementally through its Trust Centre, publishing updates as the investigation progressed. The timeline from detection to final statement spanned just eight days — fast by breach investigation standards — though questions remain about how long APT29 had access before detection.

Date Event Detail
26 June 2024 Irregularity detected TeamViewer's security team identified suspicious behaviour in the internal corporate IT environment. Incident response procedures were activated immediately. External cybersecurity experts were engaged.
27 June 2024 First public statement TeamViewer disclosed the breach via its Trust Centre. Stated the internal corporate IT environment was affected but that the product environment and customer data were not impacted. NCC Group issued an alert to clients under TLP:AMBER-STRICT warning of a significant compromise. Health-ISAC warned the healthcare sector that APT29 was actively exploiting TeamViewer.
28 June 2024 Attribution confirmed TeamViewer attributed the breach to APT29 / Midnight Blizzard. Revealed the initial access vector: compromised credentials of a standard employee account. Reaffirmed segregation between corporate IT and product environments.
30 June 2024 Data theft disclosed TeamViewer confirmed that the threat actor had copied employee directory data — names, corporate contact information, and encrypted employee passwords for the internal corporate IT environment. Microsoft engaged to mitigate the risk from stolen encrypted passwords.
4 July 2024 Investigation concluded Main incident response and investigation phase completed. TeamViewer reconfirmed: no product environment, connectivity platform, or customer data affected. Authentication procedures hardened. Internal corporate IT environment rebuild commenced toward a fully trusted state.

APT29 — Russia's most capable cyber espionage group.

APT29 is not an ordinary threat group. Operated by Russia's Foreign Intelligence Service (SVR), they are responsible for some of the most consequential cyber operations of the last decade. Their targeting of TeamViewer fits a pattern of operations against technology companies — not for financial gain, but for the intelligence access that technology platforms can provide.

Attribute Detail
Tracked Names APT29 (Mandiant), Midnight Blizzard (Microsoft), Cozy Bear (CrowdStrike), Nobelium (historical Microsoft name), The Dukes (Kaspersky), Dark Halo, UNC2452, StellarParticle, BlueBravo
State Sponsor Russia — Foreign Intelligence Service (SVR). Distinct from GRU-affiliated groups (APT28/Fancy Bear) and FSB-affiliated groups (Turla). SVR operations are intelligence-gathering focused, patient, and stealthy.
Notable Operations SolarWinds supply chain compromise (2020) — backdoored software updates reaching 18,000 organisations including US federal agencies. Microsoft corporate email breach (2024) — accessed senior executive email accounts. Democratic National Committee breach (2016). Diplomatic targeting campaigns across Western nations.
Tradecraft Patient, stealthy, and technically capable. Known for credential theft, supply chain compromises, abuse of trusted relationships, and techniques that blend with legitimate activity. Operational security is high — infrastructure is carefully managed and rotated.
Objective Intelligence collection that supports Kremlin decision-making. Targets data providing insight into foreign affairs, defence policy, technology capabilities, and the activities of foreign intelligence services.

The TeamViewer breach follows a clear pattern. Earlier in 2024, APT29 compromised Microsoft's corporate environment using the same approach — stolen credentials — and exfiltrated authentication details, credentials, and emails from senior executives. The theft of encrypted employee passwords from TeamViewer mirrors this tradecraft precisely: access to authentication material enables further operations, whether against TeamViewer's own infrastructure or against the organisations whose employees use TeamViewer.


A compromised employee account — the simplest way in.

TeamViewer confirmed that the initial intrusion was "tied to credentials of a standard employee account within our corporate IT environment." The company did not disclose how those credentials were compromised — whether through phishing, credential stuffing from a previous breach, password reuse, infostealer malware, or another method. What is known is that APT29 obtained working credentials for an ordinary employee account, logged in, and the access appeared legitimate.

This is the critical lesson. APT29 did not exploit a zero-day vulnerability. They did not breach a firewall. They did not compromise supply chain software. They logged in with a valid username and password. Every security control designed to detect external attacks — intrusion detection systems, web application firewalls, perimeter monitoring — is bypassed entirely when an attacker authenticates with legitimate credentials. The logon looks normal. The session looks normal. The attacker inherits whatever access that employee account has.

The MFA Question
Multiple security commentators noted that the breach raised questions about whether TeamViewer enforced multi-factor authentication on employee accounts. If MFA was in place, the compromised password alone would not have been sufficient for access. TeamViewer did not confirm or deny whether MFA was enabled on the compromised account, but their post-incident response included 'hardening authentication procedures to a maximum level' — a statement that implies the previous level was not the maximum.
What Was Stolen
The threat actor copied employee directory data: names, corporate contact information, and encrypted employee passwords for TeamViewer's internal corporate IT environment. While the passwords were encrypted, the theft of this data enables further attacks — credential cracking attempts, targeted phishing against named employees, social engineering leveraging corporate contact details, and potential access to other services where employees may have reused passwords.
Segregation Held
TeamViewer's architecture segregates its corporate IT environment, production environment, and connectivity platform onto separate networks with separate accounts. The investigation confirmed — and Microsoft's incident response team validated — that APT29 did not cross from corporate IT into the product environment. This segregation prevented the breach from becoming a supply chain compromise affecting TeamViewer's 2.5 billion device installations.

When your incident page says noindex.

TeamViewer published its breach disclosures through its Trust Centre — the correct channel for security communications. However, security researchers quickly discovered that the Trust Centre security update page included a <meta name="robots" content="noindex"> HTML tag, which instructs search engines not to index the page. This meant that anyone searching for information about the TeamViewer breach would not find TeamViewer's own disclosures through Google or other search engines.

TeamViewer subsequently stated that the noindex tag was a standard setting on their Trust Centre and was not intentionally applied to suppress breach information. The tag was later removed. However, the incident drew significant criticism from the security community. Transparent breach disclosure means making information findable, not merely publishing it on a page that search engines are explicitly told to ignore.

This is worth noting because it illustrates a broader pattern: organisations that experience breaches often struggle with the tension between transparent disclosure and reputational damage. The organisations that handle this well — communicating clearly, proactively, and in findable locations — tend to retain stakeholder trust. Those that appear to minimise, obscure, or delay disclosure face compounded reputational damage when the discrepancy is discovered, as it invariably is.


This is not TeamViewer's first breach.

In 2016, TeamViewer was breached by threat actors linked to China. The attackers deployed the Winnti backdoor — malware associated with Chinese state-sponsored operations — on TeamViewer's network. TeamViewer did not publicly disclose this breach until 2019, three years later, justifying the delay by stating that no data had been stolen during the intrusion.

The 2016 breach matters in the context of the 2024 incident for two reasons. First, it establishes that TeamViewer is a high-value target for nation-state threat groups — both Chinese and Russian intelligence services have independently determined that breaching TeamViewer is worth the operational investment. Second, the three-year disclosure delay for the 2016 breach provides context for the trust concerns raised by the noindex controversy in 2024. Organisations evaluating TeamViewer's transparency need to consider the full history, not just the most recent incident.


Why a corporate IT breach matters to every TeamViewer user.

TeamViewer's consistent message — that the breach was contained within the corporate IT environment and did not affect the product environment or customer data — is an important assurance. The architectural segregation between corporate IT and product infrastructure is exactly the kind of defence-in-depth that should be in place for any software company. And by all accounts, including Microsoft's independent validation, the segregation held.

However, the breach is not without risk to TeamViewer's user base, even if the product environment was not directly compromised.

Risk Scenario Likelihood
Credential reuse TeamViewer employees whose encrypted passwords were stolen may have reused those passwords on other services — including the TeamViewer product environment, personal accounts, or third-party platforms. If the encryption is cracked, those credentials enable further access. Moderate. Mitigated by TeamViewer's collaboration with Microsoft to address the encrypted password risk and mandatory credential rotation.
Targeted phishing of employees With names and corporate contact details, APT29 can craft highly targeted spear-phishing campaigns against TeamViewer employees — including those with access to the product environment. A successful phish could bridge the gap between corporate IT and production. Moderate-High. APT29 is known for patient, targeted social engineering. The stolen directory provides the exact information needed to personalise lures.
Undiscovered persistence While TeamViewer concluded the investigation and began rebuilding the corporate IT environment, there is always a residual risk that a sophisticated threat actor maintained access through mechanisms not identified during the investigation window. Low. TeamViewer rebuilt the environment toward a 'fully trusted state' — suggesting a comprehensive rebuild rather than selective remediation. However, APT29 is known for embedding persistence that survives partial remediation.
Third-party targeting via TeamViewer APT29's targeting of technology companies (SolarWinds, Microsoft, TeamViewer) follows a pattern: compromise the platform to reach its users. Even if the product environment was not breached this time, the intent to reach downstream targets through technology supply chains is documented. Ongoing. This is APT29's established operational pattern. The TeamViewer breach may be one step in a longer campaign, not an isolated incident.
Impersonation and social engineering Stolen employee names and contact details enable convincing impersonation. An attacker posing as a named TeamViewer employee — with the correct email format, department, and contact number — could socially engineer TeamViewer customers into granting access or installing modified software. Moderate. Particularly relevant for high-value TeamViewer customers in government, defence, and critical infrastructure.

Immediate and ongoing protective actions.

The following actions apply to any organisation that uses TeamViewer — whether for internal IT support, third-party vendor access, or employee remote working. They are ordered by priority: immediate actions first, then ongoing security posture improvements.

Rotate All TeamViewer Credentials
Change every TeamViewer account password in your organisation immediately. This includes administrator accounts, technician accounts, and any API keys or integration tokens. If your TeamViewer password was reused on any other service, rotate those credentials as well. Use unique, strong passwords generated by a password manager.
Enable Two-Factor Authentication
Enable 2FA on every TeamViewer account without exception. Use TOTP-based authentication (authenticator apps) rather than SMS-based 2FA. This single control would have prevented the initial compromise if TeamViewer's employee account had been protected by it — and it protects your accounts against the same attack vector.
Update to the Latest Version
Ensure every TeamViewer installation in your environment is running the latest version with current security patches. Enable automatic updates where possible. Older versions may not include security enhancements implemented in response to the breach.
Review Access Logs
Examine your TeamViewer connection logs for any unusual remote desktop activity — particularly around 26 June to 4 July 2024. Look for connections from unexpected IP addresses, connections outside normal business hours, connections to systems that should not be accessed remotely, and any TeamViewer sessions that were not initiated by a known member of your team.
Audit Your TeamViewer Deployment
Identify every system in your environment where TeamViewer is installed — including shadow IT installations that were not centrally deployed. TeamViewer's prevalence means it is often installed on systems outside the IT department's knowledge. If you do not know where TeamViewer exists in your network, you cannot assess your exposure.
Restrict TeamViewer Network Access
Configure your firewall to restrict TeamViewer traffic to only the systems and users that require it. Implement allowlists for permitted TeamViewer IDs. Use TeamViewer's conditional access policies if available on your licence tier. Block TeamViewer entirely on systems where remote access is not required.
Monitor for Anomalous Activity
Add TeamViewer-related indicators to your SIEM monitoring: unexpected TeamViewer process execution, connections to unrecognised TeamViewer IDs, TeamViewer traffic from servers or systems where it should not be present, and any attempt to install or run TeamViewer outside your approved deployment.
Evaluate Continued Use
For high-security environments — government, defence, critical national infrastructure, healthcare — this is an appropriate time to evaluate whether TeamViewer remains the right choice for remote access. Two nation-state breaches (China in 2016, Russia in 2024) in eight years is a significant risk factor. Self-hosted alternatives, VPN-based remote access, or products with a different risk profile may be appropriate depending on your threat model.

Technology supply chains as intelligence targets.

The TeamViewer breach is not an isolated incident. It is part of a documented campaign by APT29 targeting technology companies to reach their customers. SolarWinds (2020) demonstrated that a single supply chain compromise can propagate to 18,000 organisations. Microsoft (2024) demonstrated that breaching a cloud provider's corporate network can expose communications of senior government officials. TeamViewer (2024) demonstrates that remote access platforms — installed on 2.5 billion devices — are high-priority targets for the same reason.

The common thread is credential-based initial access. SolarWinds was breached through a compromised build system. Microsoft was breached through a legacy test account without MFA. TeamViewer was breached through a compromised employee account. In each case, the attacker did not need to exploit a software vulnerability. They needed working credentials.

APT29 Target Year Access Method Impact
SolarWinds 2020 Compromised build pipeline — malicious code inserted into Orion software updates 18,000 organisations installed trojanised update. US Treasury, Justice Department, Department of State, and numerous private sector organisations compromised.
Microsoft 2024 Legacy test tenant account without MFA — password spray attack Senior executive email accounts accessed. Authentication details and credentials stolen. Multiple additional organisations subsequently notified of exposure.
TeamViewer 2024 Compromised standard employee credentials Employee directory data including encrypted passwords exfiltrated. Corporate IT environment breached. Product environment reportedly not affected.

For organisations assessing their own risk, the question is not whether you use TeamViewer specifically. It is whether you have visibility into, and control over, the remote access tools deployed in your environment — and whether the vendors you depend on are hardened against the credential-based attacks that APT29 uses consistently and effectively.


What every organisation should take from this.

MFA Is Not Optional
A compromised password with MFA enabled is a non-event. A compromised password without MFA is an initial access vector for a nation-state threat group. Enforce MFA on every externally accessible service, every privileged account, and every account with access to sensitive systems. No exceptions. The TeamViewer breach, the Microsoft breach, and countless others were enabled by accounts without adequate authentication controls.
Segregation Saves
TeamViewer's architectural segregation between corporate IT and the product environment prevented this breach from becoming a supply chain catastrophe. This is the model: assume breach, design for containment. The question for your organisation is whether your critical systems and data are similarly segregated from your general corporate environment.
Transparency Builds Trust
TeamViewer disclosed the breach within 24 hours, published incremental updates, and concluded the investigation within eight days. This is commendable. The noindex controversy undermined this otherwise strong response. If you experience a breach, make your disclosures findable, not just technically published.
Know Your Third-Party Risk
Every remote access tool, managed service provider, and cloud platform in your environment is a potential attack vector for a threat actor targeting your organisation through its supply chain. Maintain an inventory. Assess the security posture of your vendors. Understand what access they have. Plan for the scenario where one of them is compromised.

The bottom line.

On 26 June 2024, APT29 — Russia's SVR cyber espionage group — breached TeamViewer's corporate IT environment using compromised employee credentials. They exfiltrated employee directory data including names, contact information, and encrypted passwords. TeamViewer's segregated architecture prevented the breach from reaching the product environment or customer data. The investigation, conducted with Microsoft, concluded within eight days.

The breach reinforces three realities that every organisation using remote access software must accept. First, remote access platforms are high-value targets for nation-state threat groups precisely because of their scale and the access they provide. Second, credential-based initial access — a stolen username and password — remains the most effective and most commonly used attack vector, even against technology companies that should know better. Third, architectural segregation is the control that prevented a corporate network breach from becoming a global supply chain incident.

If your organisation uses TeamViewer, rotate your credentials, enable MFA, audit your deployment, review your logs, and make a considered decision about whether TeamViewer's risk profile is acceptable for your environment. If your organisation uses any remote access tool, ask yourself: would we survive the same attack?


Do you know where remote access tools exist in your network?

Our penetration testing and security assessment services identify shadow IT, uncontrolled remote access installations, credential weaknesses, and lateral movement paths — the exact attack surface that APT29 exploits. If you cannot answer that question with confidence, we should talk.