[BreachExchange] OneLogin breached, hacker finds cleartext credential notepads

Audrey McNeil audrey at riskbasedsecurity.com
Wed Aug 31 19:47:44 EDT 2016


http://www.theregister.co.uk/2016/08/31/onelogin_breached_
hacker_finds_cleartext_credential_notepads/

Password attic OneLogin has been breached, and it's bad, because the
service that suffered the breach is one often used by people to store
credentials like admin password and software keys.

The online credential manager says a its Secure Notes facility was
breached, allowing the intruder to read in cleartext notes edited between 2
June and 25 August this year.

Some 12 million customers use OneLogin.

It could be a dangerous breach for those affected. OneLogin suggests Secure
Notes can be used to hold "information such as license keys and firewall
passwords" making the stolen data a gift for network exploitation and
lateral movement, should IT folks heed the advice and store sensitive
credentials in the service.

OneLogin has offered a breakdown of the incident blaming an unspecified bug
for allowing user note entries to be visible in its logs prior to being
slapped with "multiple levels of AES-256 encryption".

It says the offending hacker stole a staffer's password by means undefined
and used it to access company internals.

The company has been contacted for comment.

"Based on the activity in the log management system, we can see that the
intruder was able to view, at a minimum, notes that were updated during the
period of July 25, 2016 to August 25, 2016," chief information security
officer Alvaro Hoyos says in a statement.

"Due to the presence of the intruder as early as July 2, 2016, we are
advising customers that notes updated during period of June 2, 2016 to July
24, 2016, are also at risk."

The service has reached out to affected users it says accounts for a "small
subset" of its customers.

OneLogin has recruited an unnamed external security company to ensure it
has adequately mopped up after the breach.

The clean up includes restricting access to the affected log management
system to SAML-based authentication and from a whitelist of IP addresses,
and resetting all internal system passwords that do not already adhere to
that level of security.

"Again, our most sincere apologies. We are making every effort to prevent
any similar occurrence in the future," Hoyos says.

Google Project Zero researcher Tavis Ormandy has turned his prolific breach
blunderbuss on password managers of late, finding the cloud-based variants
to be woefully insecure and a technology to be avoided.

He recently found since-patched zero-day vulnerability in password vault
LastPass that exposed scores of users.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20160831/323bca13/attachment.html>


More information about the BreachExchange mailing list