Categories: Password Attacks

OneLogin Password Manager databse Hacked Users’ Credentials May be Decrypted

One login is a Cloud-based Password Manager which concedes a remarkable data breach, the attacker’s steal client’s credentials.

A password manager helps with creating, putting away, and recovering complex passwords from a scrambled database.Types of password managers incorporate locally installed programming applications, online administrations that are gotten to through web-based interfaces, locally accessed hardware devices that fill in as keys.
Are you using the onelogin password manager?, Need to Change your passwords immediately.

They announced, “recently we detected that a malicious actor had obtained access to our US operating region.”

Attack method

From Onelogin Blog post they recognize the threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US.

The attack originated around  May 31, 2017, around 2 am PST.

Alvaro Hoyos CISO of OneLogin’s says Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. The onelogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it.

Customer Impact

The threat actor could get to database tables that contain data about clients, applications, and different sorts of keys.

At this time they are not able to assure that the attacker can decrypt the stolen data.

OneLogin’s investigation is ongoing and is aided by independent third-party security experts, as well as law enforcement. We will update this when there is more information we can share, as appropriate. We thank you again for your continued support. says Hoyos.

Also read

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …

13 hours ago

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…

13 hours ago

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…

14 hours ago

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…

15 hours ago

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one notable…

16 hours ago

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…

16 hours ago