Researchers find TeamViewer-based cyberespionage operation

A group of attackers uses the TeamViewer remote access tool to spy on high-profile targets, researchers say

Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and former Soviet Union states.

The attacker group behind the campaign was dubbed TeamSpy because they use a malware toolkit built around the legitimate TeamViewer remote access application in order to control infected computers and extract sensitive information from them.

The operation was analyzed by researchers from the Laboratory of Cryptography and System Security (CrySyS Lab) of the Budapest University of Technology and Economics, who collaborated with several antivirus companies, including Kaspersky Lab, Symantec and ESET.

CrySyS Lab launched its investigation after being notified by the Hungarian National Security Authority about an attack against a high-profile Hungarian government target.

Evidence collected so far suggests that parts of the attack toolkit have been used since at least 2010, CrySyS Lab said in a report published Wednesday. "Many of the victims appear to be ordinary users, but some of the victims are high profile industrial, research, or diplomatic targets, including the case that triggered our investigation."

Some example of high-profile targets include: an electronics manufacturing company from Iran with ties to the Iranian government (April 2010), an unnamed high-profile Hungarian government victim (November 2012), the embassy of an unnamed NATO/EU state in Russia (March 2013), multiple research and educational organizations from France and Belgium (March 2013) and an industrial manufacturer from Russia (March 2013).

The toolkit contains a copy of the legitimate and digitally-signed TeamViewer executable file, a TeamViewer_Resource_ru.dll file that's used for Russian-language localization of the program, a malicious component called avicap32.dll that handles communication with the command and control (C2) servers and ensures the malware's persistence on the system and an encrypted configuration file called tv.cfg.

The malware is designed to download and execute other modules from the C2 servers as instructed by the attackers. The additional modules can perform various tasks including recoding keystrokes in various processes and taking screen shots, gathering information about the system and local accounts, grabbing the history of attached devices from iTunes and scanning the local hard disk and remote network shares for specific file types.

The file searching modules scan for documents (*.doc, *.rtf, *.xls, *.mdb, *.pdf), disk image files (*.tc, *.vmdk), files containing encryption keys (*. pgp, *.p12), as well as files that contain the words "password" or "secret" in English, Russian or Georgian.

Evidence found on the operation's command and control (C2) servers suggests that the TeamSpy gang is also responsible for older attack campaigns that used self-made malware tools and might date as far back as 2004. Some of those campaigns were a mix of targeted attacks and cybercrime activities like online banking fraud, the CrySyS researchers said.

Some of the more recent TeamViewer-based campaigns also targeted users from many other countries in Europe, the Middle East, Africa, North America and Asia. The campaigns were marked with unique ID numbers on the C2 servers and there are clear indications that different campaigns targeted different regions, the CrySyS researchers said.

There is strong evidence inside the malware components and the C2 infrastructure that the attackers are Russian-language speakers, security researchers from Kaspersky Lab, said in their own report on TeamSpy.

Some aspects of the operation, like the file search keywords and the use of Russian terms, are reminiscent of a different cyberespionage campaign called Red October, the Kaspersky researchers said. However there are no direct links between the two operations at the moment, they said.

"If we are to compare it to Red October, the TeamSpy Crew and the tools they use are far less sophisticated and professional," the Kaspersky researchers said. "Unlike Red October, where many IPs could be traced to governments and governmental institutions based on WHOIS data, in this case, the vast majority of IPs belong to ISPs which do not advertise such information. In case of TeamSpy crew, except for a very few cases, the identity of the victims remains a mystery."

Join the PC World newsletter!

Error: Please check your email address.

Tags intrusiononline safetysymantecsecurityDesktop securityspywaremalware

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?