TeamViewer Permissions bug can be exploited to take over computers during active sessions
TeamViewer hurries to release a fix for system vulnerability which could allow hackers to control computers during desktop sessions. The Permissions bug was first discovered on Monday when the Reddit user named xpl0yt informed about the vulnerability by showing how a proof of concept injectable C++ DLL can be used to modify TeamViewer permissions.
The bug can affect TeamViewer x86 Version 13.0.505 on MacOS, Windows and Linux operating systems. TeamViewer has admitted that they are aware of the system vulnerability and released a patch for Windows on Tuesday. According to senior PR manager, Alex Schmidt, a fix for Linux and MacOS versions should be issued on late Tuesday or Wednesday.
This TeamViewer vulnerability is a potential threat to numerous companies and private users since this application allows to share the desktop screen or transfer files from the local to a remote computer. By taking over the control during active sessions, crooks are able to control the mouse of the PC without permission.
The bug uses direct memory alteration and naked inline hooking to modify TeamViewer permissions
On GitHub, the user named Gellin explains that the proof of concept injectable C++ DLL employs pattern scanning to identify key parts in the code which hold pointers by assembly registers. Additionally, Gellin mentions the following:
It applies inline naked hooks a.k.a code caves, to hi-jack the pointers to use for modification via direct memory access to their reversed classes.
The proof of concept code can be used to enable “switch sides” feature to control the viewer's computer without consent. Originally, to do so, you have to get the approval of both, the local and the remote computer. However, TeamViewer vulnerability can be exploited using DLL injector, Manual Mapper, and PE Loader.
TeamViewer bug might be leveraged by Tech Support scammers
Security Researcher from ASERT, Nelson, says that typically, criminals take advantage of these types of bugs quickly until they are fixed. He also adds that Tech Support scammers might benefit from TeamViewer vulnerability the most:
This bug will be of particular interest to attackers carrying out malicious tech support scams. Attacker will no longer need to trick the victim into giving control of the system or running malicious software, instead they will be able to use this bug to gain access themselves.
It is vital to be aware of the TeamViewer bug, since malevolent people might damage your computer or steal private data, including credentials. Experts warn to stay safe and take precautionary measures until you receive an update to fix Permissions bug.
Prevent websites, ISP, and other parties from tracking you
Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.
A VPN is also crucial when it comes to user privacy. Online trackers such as cookies can not only be used by social media platforms and other websites but also your Internet Service Provider and the government. Even if you apply the most secure settings via your web browser, you can still be tracked via apps that you are connected to the internet. Besides, privacy-focused browsers like Tor is are not an optimal choice due to diminished connection speed.
Therefore, to stay completely anonymous and prevent the ISP and the government from spying on you, you should employ Private Internet Access VPN. It will allow you to connect to the internet while being completely anonymous, prevent trackers, ads, as well as malicious content. Most importantly, you will prevent the illegal surveillance activities that NSA and other governmental institutions are performing behind your back.
Recover your lost files quickly
Unforeseen circumstances can happen at any time while using the computer: it can turn off due to a power cut, a Blue Screen of Death (BSoD) can occur, or random Windows updates can decide to reboot the machine when you went away for a few minutes. As a result, your schoolwork, important documents, and other data might be lost.
Additionally, you might also be attacked by malware that can corrupt your Windows or encrypt files with a robust encryption algorithm, and ask for a ransom in Bitcoin for the decryption tool. Cybercriminals might not deliver what they promised, however, so it is better to attempt alternative file recovery methods that could help you to retrieve at least some portion of the lost data.
Data recovery software is one of the options that could help you recover your files. Once you delete a file, it does not vanish into thin air – it remains on your system as long as no new data is written on top of it. Data Recovery Pro is recovery software that searchers for working copies of deleted files within your hard drive. By using the tool, you can prevent loss of valuable documents, school work, personal pictures, and other crucial files.