Sunday, April 27, 2025
HomeCyber AttackNorton Password Manager Breached - Hackers Accessed Username and Password

Norton Password Manager Breached – Hackers Accessed Username and Password

Published on

SIEM as a Service

Follow Us on Google News

Customers were notified by NortonLifeLock – Gen Digital that accounts for Norton Password Manager had been successfully breached. They made it clear that the breach was targeted at user accounts rather than the company system.

According to the letter given to the Office of the Vermont Attorney General, an unauthorized third party used credential stuffing to carry out the cyberattack. It’s possible that the hacker gained access to a customer’s account using their own username and password.

“Our own systems were not compromised. However, we strongly believe that an unauthorized third party knows and has utilized your username and password for your account,” NortonLifeLock said.

- Advertisement - Google News

“This username and password combination may potentially also be known to others.”

Details of the Breach

As stated in the notification, an attempt was made to access Norton customer accounts sometime around December 1, 2022, by an attacker using the username and password combinations they purchased from the dark web.

As well, on December 12, 2022, the company discovered “an unusually large volume” of failed login attempts, which indicated a credential stuffing attack in which threat actors try out credentials in mass.

The company’s internal investigation was finished by December 22, 2022, and it showed that the credential-stuffing assaults had successfully compromised an unspecified number of customer accounts.

The company issued a warning that the hackers could have obtained customer names, phone numbers, and mailing addresses.

“In accessing your account with your username and password, the unauthorized third party may have viewed your first name, last name, phone number, and mailing address”, NortonLifeLock.

The company stated that as long as the user uses a similar or identical Password Manager Key, Norton cautioned that they cannot completely rule out the possibility that the hackers would be able to access the information stored in the Norton Password Manager.

The company claims it has changed the Norton passwords on affected accounts in order to stop attackers from obtaining access to accounts again in the future and has also put additional safeguards in place to thwart the fraudulent tries.

In order to secure user accounts, NortonLifeLock also suggests that customers enable two-factor authentication and accept the offer of a credit monitoring service. The exact number of people affected by this incident has not yet been disclosed by the company. 

“Systems have not been compromised, and they are safe and operational, but as is all too commonplace in today’s world for bad actors to take credentials found elsewhere, like the dark web, and create automated attacks to gain access to other unrelated accounts, as per a Gen Digital representative who communicated with BleepingComputer.

“We have been monitoring closely, flagging accounts with suspicious login attempts and proactively requiring those customers to reset their passwords upon login along with additional security measures to protect our customers”.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...