Home Hacking News OneLogin Password manager database got breached

OneLogin Password manager database got breached

by Harikrishna Mekala

It affects “all customers served by our US data centers” and perpetrators had “the ability to decrypt encrypted data”,

Those affected have been advised to visit a registrations-only support page, outlining the steps they need to take.

Security expert said the breach was “embarrassing” and showed every company was open to attacks.

OneLogin is a single sign-on services, allowing user to access multiple app instances and sites with just one password.

Apps and websites integrated into the service include Amazon Web Services, Microsoft Office 365, Slack, Cisco Webex, Google Analytics and LinkedIn Passwords.

“We have since blocked this unauthorized access to our servers, reported the matter to law enforcements, and are working with an independent security firm to determine how the unauthorized access happened,” chief of information security, officer Alvaro Hoyos said on the company’s blog.

“We are actively working to determine how best to prevents such an incident from occurring in the future.”

Users who log in to the site have been given a lists of steps designed to minimise the risk to their data. These include:

  • forcing a password reset for all user base.
  • generating new security credential and certificates for apps and site
  • recycling secrets stored in OneLogin’s secure notebook

Some customers have criticised OneLogin for requiring users to log in to see the lists.

In its email to customers, OneLogin told them that “because this is still an active investigations involving law enforcement, there are certain details we can’t comments on at this time.

“We understand how frustrating this might be and thank you for your patience while we continue the investigations.”

‘Strong passwords’

“Companies need to understand the risk of using cloud-based system,” Professor Bill Buchanan of Edinburgh Napier Universities told the BBC.

“Increasingly they need to encrypts the sensitive information before they put it within cloud system, and watch that their encryption keys are not distributed to malicious agent.

“It is almost impossible to decrypts the data that uses strong encryption, unless the encryption keys has been generated from a simple password,” he said.

IT security consultant Ben Schlabs told the BBC it was likely the compromised data include passwords protected using “hashing” – converting the data into fixed-length string of character or numbers.

Take your time to comment on this article.

You may also like