by johannsg on 6/1/17, 11:23 PM with 46 comments
by graystevens on 6/2/17, 4:57 AM
“Our review has shown that a threat actor obtained access to a set of AWS keys and used them to access the AWS API from an intermediate host with another, smaller service provider in the US. Evidence shows the attack started on May 31, 2017 around 2 am PST. Through the AWS API, the actor created several instances in our infrastructure to do reconnaissance. OneLogin staff was alerted of unusual database activity around 9 am PST and within minutes shut down the affected instance as well as the AWS keys that were used to create it.”
Credit where credit is due, that's a pretty quick response time for data breaches, which are normally quoted as being discovered in an average of 30 or so days.
However the fact people's information can be decrypted from this breach is awful. Sounds a lot like the private key to decrypt this information was stored alongside the data in the database... whoops! That's like storing the clear text password. Let's hope the decrypted information contains strongly hashed passwords, but I'm not holding my breath.
by manigandham on 6/2/17, 2:53 PM
Companies use OneLogin so employees have 1 service to enter their credentials and can then use federated access to apps like Google, Office 365, Salesforce, etc without signing in again, most often connected via SAML which uses public/private keys. The identity provider can also be external, so for example users can sign-in via the OneLogin UI but the username/password are actually authenticated against Office 365 Active Directory instead.
by willow9886 on 6/2/17, 2:02 PM
In addition, customers are unable to do any forensic analysis to determine how their data was affected.
> OneLogin’s blog post includes no other details, aside from a reference to the company’s compliance page.
The only option is to hope they provide customers with relevant information in a "timely manner", but that could be months for an organization with thousands of customers.
by mnm1 on 6/2/17, 5:39 PM
So it's better if that single point of failure the company puts all its eggs into is a hacked piece of shit by an engineer who couldn't build a secure login system if his life depended on it? This is a serious question and one that I've been struggling with at my current work and at every other job I've had in this industry without exaggeration. Plaintext passwords, passwords encrypted with an easily obtainable key, insecure hashes, no salts, etc. These things are the norm in DIY login schemes. This is what the quoted financial fraud analyst thinks is better and Krebs thinks is worth repeating? This should be the main point of discussion here, yet it's brushed off by the advice of a financial fraud analyst? Oh, our industry is fucked and I just lost a ton of respect for Krebs' reporting.
by mirimir on 6/2/17, 5:33 AM
Isn't that at least somewhat analogous to using the same username and password on every site?
by jupp0r on 6/2/17, 7:31 AM
Better services (1password for example) are specifically designed to never know your master password/key to avoid this very situation.
by brazzledazzle on 6/2/17, 5:17 PM
As a result of trying to be more secure a big enterprise has gone from maybe a couple single points of compromise to several. It's not as easy to do script kiddie-level attacks but the tradeoff is that a very smart and/or well funded attacker now has some very, very powerful targets.
by stcredzero on 6/3/17, 12:12 AM
Runs securely cross-platform, including tablets & smartphones
Can present a great looking UI across all platforms
Has no licensing issues in proprietary walled gardens
Can securely support plugins to integrate with webapps
This would enable startups in the personal security space to be able to serve user's needs for tracking their credentials without creating a high value centralized store of sensitive information.by yolo66 on 6/2/17, 4:52 PM
by rbranson on 6/2/17, 5:40 PM
It's easy for a Gartner analyst to sit behind a desk and pontificate about the ultimate-most-secure single-sign-on, but resource constraints are a thing. SaaS SSO is a very reasonable compromise for those who don't have the time, money, or talent to invest in on-premise infrastructure.
by dukedougal on 6/2/17, 10:45 AM
by perseusprime11 on 6/2/17, 2:59 PM
by qrbLPHiKpiux on 6/2/17, 10:53 AM
by EternalData on 6/2/17, 2:44 PM