The German software company behind TeamViewer, one of the most popular software in the world that allows users to access and share their desktops remotely, was reportedly compromised in 2016.

According to the publication, the cyber attack was launched by hackers with Chinese origin who used Winnti trojan malware.

Winnti advanced persistent threat (APT) group has previously launched a series of financial attacks against software and gaming organizations primarily in the United States, Japan, and South Korea.

Once infected, Winnti downloads a backdoor payload on the compromised computers giving attackers the ability to remotely control the victims’ computers.

Der Spiegel criticized TeamViewer company for not disclosing the intrusion to the public to inform its customers, many of which are using the targeted software in businesses.

Here’s complete statement TeamViewer shared with Hack Hex:

“Like many technology leaders, TeamViewer is frequently confronted with attacks by cyber criminals. For this reason, we continuously invest in the advancement of our IT security and cooperate closely with globally renowned institutions in this field.”

“In autumn 2016, TeamViewer was target of a cyber-attack. Our systems detected the suspicious activities in time to prevent any major damage. An expert team of internal and external cyber security researchers, working together closely with the responsible authorities, successfully fended off the attack and with all available means of IT forensics found no evidence that customer data or other sensitive information had been stolen, that customer computer systems had been infected or that the TeamViewer source code had been manipulated, stolen or misused in any other way.”

Also, in a press release published at that time, TeamViewer claimed that neither the company was hacked nor there was a security hole; instead, it blamed users for carelessly using the software.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.