Per NANOG, Level 3 and Verizon DNS were still caching the old entry.
----- Mike Hammett Intelligent Computing Solutions Midwest Internet Exchange The Brothers WISP ----- Original Message ----- From: "Chris Wright" <ch...@velociter.net> To: af@afmug.com Sent: Wednesday, June 1, 2016 3:18:47 PM Subject: Re: [AFMUG] TeamViewer hacked TeamViewer wasn’t hacked. It’s a Trojan that installs TeamViewer to backdoor into a user’s computer. Huge difference. Today it seemed more like a DNS issue than anything as though Level 3 DNS wasn’t resolving them, Google was. Chris Wright Network Administrator Velociter Wireless 209-838-1221 x115 From: Af [mailto:af-boun...@afmug.com] On Behalf Of Tyler Treat Sent: Wednesday, June 01, 2016 1:16 PM To: af@afmug.com Subject: Re: [AFMUG] TeamViewer hacked likely China has simply added teamviewer to their ip scans where they're trying passwords. knowing most humans are creatures of habit, their windows passwords is probably the same as their teamviewer/email/bank/etc From: Af < af-boun...@afmug.com > on behalf of Eric Kuhnke < eric.kuh...@gmail.com > Sent: Wednesday, June 1, 2016 3:04 PM To: af@afmug.com Subject: Re: [AFMUG] TeamViewer hacked Teamviewer isn't "hacked", they're taking a >130Gbps DDoS to their DNS infrastructure at the moment... The previous issue is from people re-using the same password on multiple sites, and creating teamviewer instances on their workstation PCs with the same passwords. Nobody has identified a remote 'hole' in teamviewer. On Wed, Jun 1, 2016 at 12:51 PM, Rory Conaway < r...@triadwireless.net > wrote: http://www.inquisitr.com/3156809/teamviewer-accounts-hacked-thousands-of-customers-vulnerable/ Rory Conaway • Triad Wireless • CEO 4226 S. 37 th Street • Phoenix • AZ 85040 602-426-0542 r...@triadwireless.net www.triadwireless.net “A hot dog at the ballgame beats roast beef at the Ritz.” ~Humphrey Bogart