Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    OneLogin Password Manager Breach Enabled by Stolen AWS Cloud Keys

    Written by

    Sean Michael Kerner
    Published June 2, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Online password manager service OneLogin reported on May 31 that it was the victim of a data breach that exposed its users and their data to risk.

      Initially the company provided few details, other than disclosing the fact that there was an unauthorized access to OneLogin customer data. Late on June 1, the company provided more details, revealing that attackers had infiltrated OneLogin’s cloud backend and had unfettered access for seven hours prior to being detected.

      OneLogin is using Amazon Web Services (AWS) as its cloud provider and at approximately 2 am PST on May 31, a hacker was somehow able to use OneLogin’s AWS credentials. OneLogin’s AWS keys were used by the attacker from a smaller, unidentified service provider in the U.S, that was able to create new virtual server instances to get visibility and perform reconnaissance into OneLogin’s operations.

      “OneLogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it,” Alvaro Hoyos,Chief Information Security Officer at OneLogin wrote in a blog post. “The threat actor was able to access database tables that contain information about users, apps, and various types of keys.”

      Hoyos added that it’s also possible the attacker was able to get the information needed to also be able to decrypt user data.

      This isn’t the first time OneLogin has reported a data breach. In August 2016 the company reported a breach in the company’s Secure Notes service. In that incident the root cause was identified as a bug in the platform that enabled attackers to view notes before they were encrypted.

      Possible Threat Vectors 

      At this point, it’s unclear how the attacker was able to get access to OneLogin’s AWS credentials or why it took the company seven hours to detect the unauthorized access.

      There are a number of potential vectors by which an attacker could have breached OneLogin’s security. In many attacks, some form of directed, spear-phishing email is often found to be a root cause. In such a scenario, an attacker sends a fake phishing email to a privileged account holder and then gets the victim to click or log into a service, which then steals the user’s credentials.

      With AWS in particular though, there are other potential threat vectors that can place unsuspecting organizations at risk. An April 2017 study from security vendor Threat Stack, found that 73 percent of AWS users were leaving the Secure SHell (SSH) service open to the public internet on their cloud instances. SSH is commonly used to remotely administer a server instance.

      The Threat Stack study also found that not all AWS users were using Amazon’s CloudTrail auditing service in all zones. CloudTrail can be used by organizations to identify potentially unauthorized access and account anomalies. 

      However the attacker was able to get access to OneLogin’s AWS credentials, the bottom line is the attack should serve as a wake up call for all organizations to revisit and harden their cloud access credentials and monitoring policies.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×