TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OneLogin: Breach Exposed Ability to Decrypt Data

159 pointsby johannsgalmost 8 years ago

14 comments

graystevensalmost 8 years ago
The recent update from Krebs gives some interesting details into how the attack took place, something we don&#x27;t get to hear very often:<p><i>“Our review has shown that a threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US. Evidence shows the attack started on May 31, 2017 around 2 am PST. Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. OneLogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it.”</i><p>Credit where credit is due, that&#x27;s a pretty quick response time for data breaches, which are normally quoted as being discovered in an average of 30 or so days.<p>However the fact people&#x27;s information can be decrypted from this breach is awful. Sounds a lot like the private key to decrypt this information was stored alongside the data in the database... whoops! That&#x27;s like storing the clear text password. Let&#x27;s hope the decrypted information contains strongly hashed passwords, but I&#x27;m not holding my breath.
评论 #14467633 未加载
评论 #14471197 未加载
评论 #14467945 未加载
manigandhamalmost 8 years ago
Lots of confusion in all the posts about OneLogin - they are <i>not</i> a password manager like lastpass, they are a Single Sign-On (SSO) and Identity Provider, meaning they integrate with other services, maintain a master directory of all users, and provide a single login UI for all connected apps.<p>Companies use OneLogin so employees have 1 service to enter their credentials and can then use federated access to apps like Google, Office 365, Salesforce, etc without signing in again, most often connected via SAML which uses public&#x2F;private keys. The identity provider can also be external, so for example users can sign-in via the OneLogin UI but the username&#x2F;password are actually authenticated against Office 365 Active Directory instead.
评论 #14470820 未加载
评论 #14470486 未加载
评论 #14470450 未加载
willow9886almost 8 years ago
This is my primary concern with SaaS identity providers--yes, they are easy to setup and administrate, but they are huge honey pots.<p>In addition, customers are unable to do any forensic analysis to determine how their data was affected.<p>&gt; OneLogin’s blog post includes no other details, aside from a reference to the company’s compliance page.<p>The only option is to hope they provide customers with relevant information in a &quot;timely manner&quot;, but that could be months for an organization with thousands of customers.
mnm1almost 8 years ago
&#x27;Gartner Inc. financial fraud analyst Avivah Litan said she has long discouraged companies from using cloud-based single sign-on services, arguing that they are the digital equivalent to an organization putting all of its eggs in one basket.&#x27;<p>So it&#x27;s better if that single point of failure the company puts all its eggs into is a hacked piece of shit by an engineer who couldn&#x27;t build a secure login system if his life depended on it? This is a serious question and one that I&#x27;ve been struggling with at my current work and at every other job I&#x27;ve had in this industry without exaggeration. Plaintext passwords, passwords encrypted with an easily obtainable key, insecure hashes, no salts, etc. These things are the norm in DIY login schemes. This is what the quoted financial fraud analyst thinks is better and Krebs thinks is worth repeating? This should be the main point of discussion here, yet it&#x27;s brushed off by the advice of a financial fraud analyst? Oh, our industry is fucked and I just lost a ton of respect for Krebs&#x27; reporting.
评论 #14474793 未加载
mirimiralmost 8 years ago
&gt; After OneLogin customers sign into their account, the service takes care of remembering and supplying the customer’s usernames and passwords for all of their other applications.<p>Isn&#x27;t that at least somewhat analogous to using the same username and password on every site?
评论 #14467810 未加载
评论 #14467803 未加载
评论 #14471018 未加载
评论 #14470708 未加载
jupp0ralmost 8 years ago
I&#x27;m not a user of OneLogin, but if they store encrypted passwords <i>and</i> encryption keys, their security model is fundamentally broken imho and I&#x27;d never give them my passwords.<p>Better services (1password for example) are specifically designed to never know your master password&#x2F;key to avoid this very situation.
评论 #14469472 未加载
评论 #14468979 未加载
评论 #14468406 未加载
brazzledazzlealmost 8 years ago
These SSO providers like OneLogin and Okta are incredibly high value targets. State-level targets. I predict that SSO providers and security tools (whether on-prem or SaaS) will be targeted and breached more and more often. The SSO providers are the middle men for accessing everything so they literally have the keys to the kingdom. Security tools are given incredible amounts of access and permissions without question.<p>As a result of trying to be more secure a big enterprise has gone from maybe a couple single points of compromise to several. It&#x27;s not as easy to do script kiddie-level attacks but the tradeoff is that a very smart and&#x2F;or well funded attacker now has some very, very powerful targets.
stcredzeroalmost 8 years ago
There seems to be a great need for an Open Source password vault codebase&#x2F;library that:<p><pre><code> Runs securely cross-platform, including tablets &amp; smartphones Can present a great looking UI across all platforms Has no licensing issues in proprietary walled gardens Can securely support plugins to integrate with webapps </code></pre> This would enable startups in the personal security space to be able to serve user&#x27;s needs for tracking their credentials without creating a high value centralized store of sensitive information.
yolo66almost 8 years ago
How did this happen ? We see big companies getting hacked all the time, how do we protect our products ? I&#x27;m an engineer, and have no clue about how I could protect myself against such attacks.
rbransonalmost 8 years ago
One thing to remember in all of this is that services like OneLogin are likely a huge upgrade in security for their customers. They lower the barriers for moving away from things like shared passwords and poorly functioning in-house SSO setups.<p>It&#x27;s easy for a Gartner analyst to sit behind a desk and pontificate about the ultimate-most-secure single-sign-on, but resource constraints are a thing. SaaS SSO is a very reasonable compromise for those who don&#x27;t have the time, money, or talent to invest in on-premise infrastructure.
dukedougalalmost 8 years ago
How was a central password store ever a good idea?
评论 #14469271 未加载
评论 #14470501 未加载
评论 #14469884 未加载
perseusprime11almost 8 years ago
I use onelogin. Should I change my password?
qrbLPHiKpiuxalmost 8 years ago
Come down to this: your most sensitive data is in danger of one misplaced character or one wrong click.
EternalDataalmost 8 years ago
I&#x27;m thinking of splitting my logins into a set of essential information in a paper journal -- while keeping some transactional passwords on 1password. 1password was one of those times where I decided to trade off convenience for absolute security -- which I&#x27;m realizing is a mistake.