ClickStudios' Password Manager Compromised by a Malicious Update

  • By Dawna M. Roberts
  • Published: May 06, 2021
  • Last Updated: Mar 18, 2022

Security experts recommend as part of security best practices to use a password manager. However, the last thing they expect is for that password manager to be compromised by an attack. Australia's ClickStudios password manager recently experiences such a breach.

What Happened?ClickStudios' Password Manager Malware

Threat researchers from CSIS Security Group reported that the company ClickStudios was attacked between April 20 and April 22. The hackers uploaded a malicious update to its password manager with malware inside, "Passwordstate." According to the notice posted on April 23, the attackers used a Zip file with a dynamic link library ("moserware.secretsplitter.dll") laced with malicious code.

CSIS Security Group commented that "The malicious code tries to contact [a URL] in order to retrieve an encrypted code. Once decrypted, the code is executed directly in memory."

Threat researchers dubbed the malware "Moserpass," which contacts a command-and-control server to execute additional commands. Before researchers could investigate further, the command server was shut down. They did comment that the code was small, less than 4KB of data.

SentinelOne researcher Juan Andres Guerrero-Saade posted on Twitter, "At a glance, the Loader has the functionality to pull a next stage payload from the [command and control server]. "There's also code to parse the 'PasswordState' vault's global settings (Proxy UserName/Password, etc.) about the incident"

How Did ClickStudios Respond?

ClickStudios could not be reached for a comment about the attack. So, at this point, it is unknown how many customers that use Passwordstate may have downloaded the malicious update. ClickStudios does boast of serving more than 29,000 individuals and 370,000 security and IT companies worldwide. The tool is used as a vault for passwords and to share "sensitive password resources."

The ClickStudios website contained a message to customers saying:

"At Click Studios, we take the privacy of our customers very seriously. Many have expressed the wish to keep private that they have selected Passwordstate to protect their credentials. As much as we would like to advertise all our customers on our website, we hope you can appreciate us honouring their wishes and keeping this information private and confidential."

Threat experts are calling the incident another supply chain attack. Hackers are targeting companies and data repositories that provide them access to a wide variety of individual users. The attack is one on a long line of supply chain attacks following the SolarWinds Orion attack. Along with them, Microsoft Exchange, Accellion, and Codecov have recently been targeted with breaches to access thousands of end-users. Some of these recent attacks are still sending shockwaves of damage through the industry. 

Is it Safe to Use a Password Manager?

It is widely recommended that individuals and companies use password managers to keep and store very strong passwords for all devices, systems, and logins. However, are these programs safe?

As with most things, password managers are not all the same. Many do not store customers' passwords on their own database structure. They use other cloud systems or encrypted data servers. Some run locally on the users' machine only. 

The key to keeping your online life safe is to do your research. Read reviews and delve deeply into the inner workings of the password manager you choose. Before signing up, find out how your data will be collected, stored, and used. In this world full of hackers and ransomware, you cannot be too careful. Consult IT experts and what programs they recommend for storing your most critical and sensitive passwords. To keep your private information secret, you must be your own advocate and check everything. Keep a close eye on your home and office network. Use good, strong antivirus and keep everything updated with the latest security patches. 


In the event of a data breach, change all your passwords immediately.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close