Per NANOG, Level 3 and Verizon DNS were still caching the old entry. 



----- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 




----- Original Message -----

From: "Chris Wright" <ch...@velociter.net> 
To: af@afmug.com 
Sent: Wednesday, June 1, 2016 3:18:47 PM 
Subject: Re: [AFMUG] TeamViewer hacked 



TeamViewer wasn’t hacked. It’s a Trojan that installs TeamViewer to backdoor 
into a user’s computer. Huge difference. 

Today it seemed more like a DNS issue than anything as though Level 3 DNS 
wasn’t resolving them, Google was. 


Chris Wright 
Network Administrator 
Velociter Wireless 
209-838-1221 x115 



From: Af [mailto:af-boun...@afmug.com] On Behalf Of Tyler Treat 
Sent: Wednesday, June 01, 2016 1:16 PM 
To: af@afmug.com 
Subject: Re: [AFMUG] TeamViewer hacked 


likely China has simply added teamviewer to their ip scans where they're trying 
passwords. knowing most humans are creatures of habit, their windows passwords 
is probably the same as their teamviewer/email/bank/etc 






From: Af < af-boun...@afmug.com > on behalf of Eric Kuhnke < 
eric.kuh...@gmail.com > 
Sent: Wednesday, June 1, 2016 3:04 PM 
To: af@afmug.com 
Subject: Re: [AFMUG] TeamViewer hacked 





Teamviewer isn't "hacked", they're taking a >130Gbps DDoS to their DNS 
infrastructure at the moment... 
The previous issue is from people re-using the same password on multiple sites, 
and creating teamviewer instances on their workstation PCs with the same 
passwords. Nobody has identified a remote 'hole' in teamviewer. 



On Wed, Jun 1, 2016 at 12:51 PM, Rory Conaway < r...@triadwireless.net > wrote: 


http://www.inquisitr.com/3156809/teamviewer-accounts-hacked-thousands-of-customers-vulnerable/
 

Rory Conaway • Triad Wireless • CEO 
4226 S. 37 th Street • Phoenix • AZ 85040 
602-426-0542 
r...@triadwireless.net 
www.triadwireless.net 

“A hot dog at the ballgame beats roast beef at the Ritz.” ~Humphrey Bogart 


Reply via email to