Anyone Seeing Teamviewer Hacks?

I've been hearing/seeing multiple reports of what appear to be TeamViewer account hacks that look like more than simple password leaks. Has anyone else seen/heard of this?

http://security.stackexchange.com/questions/115330/unauthorized-remote-control-performed-today-teamviewer

http://teamviewerforums.com/index.php?topic=3485.0

http://teamviewerforums.com/index.php?topic=3500.0

http://teamviewerforums.com/index.php?topic=3501.0

http://teamviewerforums.com/index.php?topic=3483.0

https://www.paypal-community.com/t5/About-Protections/Hacked-teamviewer-Fraudulent-PP-Transactions/td-p/1040227

It looks like in most cases attackers are using stored credit card info or credentials in browsers to order gift cards or other online purchases.

Teamviewer has come up in discussions about remote access on IPVM before, if you have Teamviewer installed you may want to review the above links and check up on those machines.

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

*****,

***** *** *** *** ***********, **** ** ** ******* *** accounts ***** *** ****** *********. *** ***** ** *** ******** above ** ***** ** ****** *** ******* **** ******* ** place ****** ***** *** ******* *********** **** **** **** ***** in ***** ********, ******* ******* ** *** */* *******'* ** auto *****.

***'* *** ***** **** *** **** **** ** **** * purchase ** **** *********? * **** ****** *** ** ** exception ** ****, *** **** ****** ****** ** ******* **.

*** - ** ** **********, ***, *** ** ***** ***** are ******* ******* ** ****** ********* **** ****** ***********. ***** also ******* ** ***** **** **** *********, ***** *** ** possible ******* ******, *** **** ****** *********, ***** *** *** do **** **** **** ***********.

** *** ***** * *** ******* ** ****** **** *** you ** **-***** **** ******* *** ************.

** ***** ** *** ****** **** **** ******* *** **** accessed ***'* ****** ********* ** **** ******* ** *** ******* could **** **** ********* * ********* **** *** **** ******* all ********** **** ** ****. *** **** **** *** ** to **** *** ******* & ********* **********. *** **** ********* but ***** *** ** ***** **** *** ********* *** ******* has **** *******.

* *****'* **** *** ***** **** *** ** ********* *** hack, *** ** ***** ********* ** **** *** ******* ******* more *************. *.*. ******'* *** ********** ****** *** ******** *** presence ** ******* ** * ********* *********?

***** **** **** ****** **************

*** ******* ** **** ***** *** ** ** *** ***********... spoke **** ******* ** *** ***** *** **** ****** (** the ******* ***) **** ** ** * ****** ******* *****... they **** ******* ** ***** **** ************ ** *** ******* work ****** ** *** *** ****** ** *******... *** **** what ** ***** ***** *** ***** *********...

*** **** **** ******, ** * **** * ***** ******** I ***** ** ********* * ******* ****** ** *****.

* ****** *** (**) *** ** **-***** ******** ** **********'* authentication ********:

*****://***.*****.***/****/**********-**************-********-****-*-**-*

***** *** * *** ****** ******* **** ** ************ ********. Hopefully **** **** ***** ** ******** *,*,*,**,**.

**** *****, ********* **** ** ******** ***** *****, ****'* *** ******** by **** ****** *****:

*** ** ***** ******* **** **** ****** ** ****** ***********/**** Viewer ******** ******* ****** **** ******* *** ******* *** ******** techs ** ** ******* ‘*******

* **** **** ***'* *** *** *****, *** ********* ******** added *** ****** ************** *** **** ***** **** * ****** candidate ** ** *********** ** ***/**********/***.

** ********** *** ****** * ****** ****** *** *** $****** was **** *** *** ******.

* ****** **** ** *** *** *** ******** ***** ******** keyboard *** ***** ******** ****** * **** ******.
* ******* ** **** ** ********** *** **** **** ** that ** *** ** ******* **** *** ******, ** * thought **** **** ******* ** ********.

** ****** ******* ********** ** ***** **** **, **** **** that *** ** ***** *** ****** ***/** *** ***** ******* website (****** ***...) *** ***'* **** ********* *** *** ********* sites...