Saturday, February 22, 2025
HomePassword AttacksOneLogin Password Manager databse Hacked Users’ Credentials May be Decrypted

OneLogin Password Manager databse Hacked Users’ Credentials May be Decrypted

Published on

SIEM as a Service

Follow Us on Google News

One login is a Cloud-based Password Manager which concedes a remarkable data breach, the attacker’s steal client’s credentials.

A password manager helps with creating, putting away, and recovering complex passwords from a scrambled database.Types of password managers incorporate locally installed programming applications, online administrations that are gotten to through web-based interfaces, locally accessed hardware devices that fill in as keys.
Are you using the onelogin password manager?, Need to Change your passwords immediately.

They announced, “recently we detected that a malicious actor had obtained access to our US operating region.”

Attack method

From Onelogin Blog post they recognize the threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US.

The attack originated around  May 31, 2017, around 2 am PST.

Alvaro Hoyos CISO of OneLogin’s says Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. The onelogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it.

Customer Impact

The threat actor could get to database tables that contain data about clients, applications, and different sorts of keys.

At this time they are not able to assure that the attacker can decrypt the stolen data.

OneLogin’s investigation is ongoing and is aided by independent third-party security experts, as well as law enforcement. We will update this when there is more information we can share, as appropriate. We thank you again for your continued support. says Hoyos.

Also read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

10 Best WiFi Hacking Apps for Android – 2024 Edition

In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants....

Brutespray – Port Scanning and Automated Brute Force Tool

Brutespray is a Python script that provides a combination of both port scanning and automated...