- Jul 27, 2015
- 5,459
A mysterious threat actor has compromised the update mechanism of enterprise password manager application Passwordstate and deployed malware on its users’ devices, most of which are enterprise customers. Click Studios, the Australian software firm behind Passwordstate, has notified its 29,000 customers earlier today via email.
Danish security firm CSIS, which dealt with the aftermath of this supply chain attack, published today an analysis of the attacker’s malware. The security firm said the threat actor forced the Passwordstate apps to download an additional ZIP file named “Passwordstate_upgrade.zip” that contained a DLL file named “moserware.secretsplitter.dll.” After installation, this DLL file would ping a remote command and control server, from where it would request new commands and retrieve additional payloads. Unfortunately, once the intrusion was discovered, the attackers immediately took down their C&C server, which has prevented investigators from discovering what additional payloads and other actions the attackers performed.
Since this is a password manager is sold primarily in bulk to enterprises, to whom it is advertised as an on-premises system, changing passwords won’t involve just email and website accounts, but also passwords for internal gear such as firewalls, VPNs, switches, routers, network gateways, and others, which many employees would most likely have saved inside the app thinking it was a secure local storage system.
Password manager Passwordstate hacked to deploy malware on customer systems
A mysterious threat actor has compromised the update mechanism of enterprise password manager application Passwordstate and deployed malware on its users\' devices, most of which are enterprise customers.
therecord.media