未加星标

Blur password manager exposes 2.4M user details on misconfigured AWS instance

字体大小 | |
[网络安全 所属分类 网络安全 | 发布者 店小二05 | 时间 2019 | 作者 红领巾 ] 0人收藏点击收藏

Abine Inc. , the company behind the Blue password manager andDeleteMe privacy-protection service has admitted that it accidentally exposed data relating to 2.4 million users on a misconfigured Amazon Web Services instance.

The company made the announcement on Dec. 31, making it the last AWS storage stuff up of the year with the file with user data being discovered on Dec. 13.

The data in the file related to Blur users who had signed up prior to Jan. 6, 2018 and included usernames,emails, password hints and the last and second-to-last IP addresses that were used to login to Blur.

Passwords were also in the file but wereencrypted with bcryptwith a unique salt for every user. The security key was fortunately not included in the exposed document.

“There is no evidence that the usernames and passwords stored by our users in Blur, auto-fill credit card details, Masked Emails, Masked Phone numbers, and Masked Credit Card numbers were exposed,” the Abine is in a blog post . “There is no evidence that user payment information was exposed.”

While finding no evidence that the document had been accessed, Abine is none-the-less warning users that their accounts may have been compromised. Users are being asked to reset their master passwords for Blur and to set up two-factor authentication as an additional security measure.

Blur is not the first password manager to have had security issues. LastPass was infamously hackedin 2015 before having to issue an urgent patchin 2017 after it was discovered that plugins related to the product could expose customer passwords.

LastPass, though, was a different case as it was specifically targeted by hackers. That a company that offers password protection software would “accidentally” expose user data on an AWS S3 instance is a whole different level of incompetence.

“As a privacy and security-focused company this incident is embarrassing and frustrating. These incidents should not happen and we let our users down,” the company said.

“We apologize and are working very hard to ensure we respond quickly and effectively to this incident and make sure we do everything we can to not let anything like it happen again.”

Image: Abine Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.

The journalism, reporting and commentary onSiliconANGLE― along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE ― take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,, and keep coming back to SiliconANGLE .

本文网络安全相关术语:网络安全工程师 网络信息安全 网络安全技术 网络安全知识

代码区博客精选文章
分页:12
转载请注明
本文标题:Blur password manager exposes 2.4M user details on misconfigured AWS instance
本站链接:https://www.codesec.net/view/628513.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 网络安全 | 评论(0) | 阅读(820)