{"id":2644,"date":"2017-04-18T05:42:06","date_gmt":"2017-04-18T09:42:06","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2644"},"modified":"2025-03-05T13:52:06","modified_gmt":"2025-03-05T13:52:06","slug":"hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/","title":{"rendered":"&#8220;Hello. Team of TeamViewer is calling you&#8230; &#8220;. An anthology of the attack."},"content":{"rendered":"<p>The systems of protecting computers and networks are becoming more perfect every day. It&#8217;s harder for hackers to find a way to access data on someone else&#8217;s computer. A man remains the weakest link in cyber security. Not without reason 95 attacks on computer systems and networks begin with phishing ones. An example of such an attack observed in the last few months is mass mailings of infected Office documents. Thus, hackers try to intercept control on Windows and MacOS computers.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>But this article will tell you about another type of attack. The specialists of Digital Forensic Corp. investigated several similar incidents. Subsequently, the collected evidence was given to the police to detain hackers.<\/p>\n<p>&nbsp;<\/p>\n<p>The attack began quite unusually. There was a call in our client&#8217;s apartment on early Saturday morning and a voice in the receiver said: &#8220;Hello. Team of TeamViewer is calling you &#8230; &#8220;.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"638\"><strong>Team Viewer <\/strong>is commonly used as remote access software often utilized for Internet-based remote control, file transfer and technical support. TeamViewer software can connect to any PC or server for remote control of the machine as if the user is sitting directly in front of the workstation.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Then a touching story was told that TeamViewer company had stopped its work and partially returned the money spent on the purchase of TeamViewer services.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>After that the client was asked for the details of the account to which the company could return the money. After a while, a voice in the receiver said: &#8220;Ooops. We have transferred you more than it is necessary. Let&#8217;s check.&#8221; Our client gave the intruder the remote access to his computer on TeamViewer and opened the online banking page. And they made sure together that he had received more than\u00a0\u00a0 $ 2000 to his account. After that, the intruder offered our client to return some of the money. Our client went to the bank to put money on the intruder\u2019s account. The intruder was left alone with the client&#8217;s computer. When our client returned, he found out that there was no more money on his bank account.<\/p>\n<p>&nbsp;<\/p>\n<p>What had happened?<\/p>\n<p>What was the caller doing on the client\u2019s computer \u00a0while he was away?<\/p>\n<p>What kind of information was stolen from the computer?<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>To answer this question our client sent his iMac to Digital Forensic Corp. where it was studied by specialists of cyber security and incident response.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>TeamViewer\u2019s log files were analyzed, the History of the Web Browser and some other artifacts were studied. The description of what had happened was made based on the analysis.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>LIST OF ACTIVITIES DURING THE ATACK<\/strong><\/p>\n<table width=\"575\">\n<tbody>\n<tr>\n<td width=\"479\"><strong>Action<\/strong><\/td>\n<td width=\"95\"><strong>Time<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: teamviewer &#8211; Google Search<\/td>\n<td width=\"95\">09:21<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History:\u00a0 TeamViewer Remote Support, Remote Access, Service Desk, Online Collaboration and Meetings<\/td>\n<td width=\"95\">09:21<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Attempt to initiate TeamViewer session with ID of the intruder #1<\/td>\n<td width=\"95\">09:30<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Attempt to initiate TeamViewer session with of the intruder #1<\/td>\n<td width=\"95\">09:31<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The World&#8217;s Fastest Remote Desktop Application &#8211; AnyDesk<\/td>\n<td width=\"95\">09:44<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Download &#8211; AnyDesk<\/td>\n<td width=\"95\">09:44<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Attempt to initiate TeamViewer session with of the intruder #1<\/td>\n<td width=\"95\">09:52<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"575\">THE ATTACK STARTED<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Cache is reset and disabled.<\/td>\n<td width=\"95\">09:59<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">The intruder #2\u00a0 is added to TeamViewer session with device name \u201cINTRUDER\u2019S_PC\u201d<\/td>\n<td width=\"95\">09:59<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">1 file is transferred.<\/td>\n<td width=\"95\">09:59<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">TeamViewer Settings were changed to allow REMOTE CONTROL ACCESS, FILE TRANSFER and SWITCH SIDES (allows to change the direction of control).<\/td>\n<td width=\"95\">09:59<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Screenshot of the desktop is made.<\/td>\n<td width=\"95\">09:59<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Western Union | Send money to 200 countries and territories in 130 currencies | Trusted for 145 Years<\/td>\n<td width=\"95\">10:00<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Sign in &#8211; Google Accounts<\/td>\n<td width=\"95\">10:10<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Sign in &#8211; Google Accounts<\/td>\n<td width=\"95\">10:13<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: My Account<\/td>\n<td width=\"95\">10:15<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Gmail<\/td>\n<td width=\"95\">10:16<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Western Union: verify your email \u2013 xxxxxxxxx@gmail.com &#8211; Gmail<\/td>\n<td width=\"95\">10:17<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Pending Verification | Western Union<\/td>\n<td width=\"95\">10:27<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Logged Out | Western Union<\/td>\n<td width=\"95\">10:43<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank\u2019s site<\/td>\n<td width=\"95\">10:46<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank\u2019s site<\/td>\n<td width=\"95\">10:46<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank\u2019s site<\/td>\n<td width=\"95\">10:48<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: chrome download &#8211; Google Search<\/td>\n<td width=\"95\">10:49<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Chrome for Desktop<\/td>\n<td width=\"95\">10:50<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Continuous attempts were made to change TeamViewer visibility settings:\u00a0 However, due to special security settings of the Apple manufactured devices all attempts were unsuccessful.<\/td>\n<td width=\"95\">12:16<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Inbox (4) &#8211; xxxxxxxxx @gmail.com &#8211; Gmail<\/td>\n<td width=\"95\">13:43<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank\u2019s site &#8211; Google Search<\/td>\n<td width=\"95\">14:11<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: Online Banking &#8211; Online Savings &amp; Checking Accounts &#8211; The Bank<\/td>\n<td width=\"95\">14:11<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank Sign On to View Your Accounts<\/td>\n<td width=\"95\">14:13<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Web History: The Bank\u00a0 Sign On to View Your Accounts<\/td>\n<td width=\"95\">14:13<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Access to file #1<\/td>\n<td width=\"95\">15:10<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Access to file #2<\/td>\n<td width=\"95\">15:10<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">Access to file #3<\/td>\n<td width=\"95\">15:35<\/td>\n<\/tr>\n<tr>\n<td width=\"479\">TeamViewer session ended.<\/td>\n<td width=\"95\">18:10<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"575\">THE ATTACK FINISHED<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>As soon as the intruder #1 gained access to the client\u2019s computer, he gave a command to disable logging immediately. Then he gave the intruder # 2 remote access to this computer.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Then TeamViewer was set up to ensure that the intruders had the opportunity to connect to this computer at any time. Although the attackers did not have access to the computer&#8217;s camera, they heard all the sounds in the room through the microphone.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The intruders got access to the client\u2019s bank account and e-mail using a computer. They also looked through several files. Probably the intruders searched for confidential information or passwords.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>In addition, in the attack process, the intruders repeatedly tried to delete the log files, and attempts were made to install a remote control application that would work in the hidden mode. However, these attempts were unsuccessful.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>In this article we considered an example of an attack when a well-protected computer system could not prevent the theft of money from its owner. TeamViewer and its employees are not involved in this attack. The intruders could use the names of other well-known companies and social networks instead of TeamViewer. And such cases are also known to us.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>To prevent theft of funds and some information that can be later used by intruders for extortion don\u2019t allow strangers any remote access. Don\u2019t give them service codes, credit card numbers, ID numbers.<\/p>\n<p>&nbsp;<\/p>\n<p>Authors:<\/p>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"The systems of protecting computers and networks are becoming more perfect every day. It&#8217;s harder for hackers to&hellip;","protected":false},"author":126,"featured_media":2643,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2644","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Terror Of TeamViewer Cyber Attacks<\/title>\n<meta name=\"description\" content=\"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Hello. Team of TeamViewer is calling you... &quot;. An anthology of the attack.\" \/>\n<meta property=\"og:description\" content=\"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-18T09:42:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-05T13:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"&#8220;Hello. Team of TeamViewer is calling you&#8230; &#8220;. An anthology of the attack.\",\"datePublished\":\"2017-04-18T09:42:06+00:00\",\"dateModified\":\"2025-03-05T13:52:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/18042017.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/\",\"name\":\"The Terror Of TeamViewer Cyber Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/18042017.jpg\",\"datePublished\":\"2017-04-18T09:42:06+00:00\",\"dateModified\":\"2025-03-05T13:52:06+00:00\",\"description\":\"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/18042017.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/18042017.jpg\",\"width\":800,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"&#8220;Hello. Team of TeamViewer is calling you&#8230; &#8220;. An anthology of the attack.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Terror Of TeamViewer Cyber Attacks","description":"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/","og_locale":"en_US","og_type":"article","og_title":"\"Hello. Team of TeamViewer is calling you... \". An anthology of the attack.","og_description":"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-04-18T09:42:06+00:00","article_modified_time":"2025-03-05T13:52:06+00:00","og_image":[{"width":800,"height":467,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"&#8220;Hello. Team of TeamViewer is calling you&#8230; &#8220;. An anthology of the attack.","datePublished":"2017-04-18T09:42:06+00:00","dateModified":"2025-03-05T13:52:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/","name":"The Terror Of TeamViewer Cyber Attacks","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg","datePublished":"2017-04-18T09:42:06+00:00","dateModified":"2025-03-05T13:52:06+00:00","description":"A comprehensive guide on how TeamViewer is exploited by cybercriminals to create cyber attacks.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/18042017.jpg","width":800,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/hello-team-of-teamviewer-is-calling-you-an-anthology-of-the-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"&#8220;Hello. Team of TeamViewer is calling you&#8230; &#8220;. An anthology of the attack."}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2644"}],"version-history":[{"count":1,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2644\/revisions"}],"predecessor-version":[{"id":8088,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2644\/revisions\/8088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2643"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}