Credential theft
OneLogin Single Sign-On Breach β Customer Data Decrypted by Attacker
Primary Source βIncident Details
On 31 May 2017, OneLogin β an enterprise single sign-on and identity management provider serving approximately 2,000 enterprise customers β suffered a breach in which an attacker obtained and used AWS access keys to access OneLogin’s US data region. The attacker was able to use the AWS API access to access encrypted customer data and obtain decryption keys, giving them access to plaintext customer data including OneLogin’s customer data, apps, and their own secrets (which are managed through OneLogin’s platform). OneLogin disclosed the breach the same day it was detected and immediately terminated the attacker’s access. The breach was particularly serious because OneLogin serves as a single sign-on provider β meaning that compromised OneLogin credentials or secrets could cascade to provide access to all applications that customers use OneLogin to authenticate with. OneLogin warned all affected customers that the threat actor may be able to decrypt encrypted data as the attacker may have obtained the ability to decrypt data. OneLogin advised all customers to generate new API credentials, OAuth tokens, and security certificates, and to recycle all secrets stored in OneLogin’s Secure Notes. The breach highlighted the critical nature of identity provider security and the catastrophic impact of a breach affecting an SSO platform used across thousands of enterprise applications.
Technical Details
- Initial Attack Vector
- Attacker obtained access keys to the AWS platform used by OneLogin's US data region via an unknown mechanism, then used those keys to create AWS API calls to enumerate OneLogin's infrastructure and access customer data; the attacker used AWS API access to decrypt data stored in OneLogin's environment
- Vendor / Product
- OneLogin single sign-on / identity management platform
Timeline
- 2017-05-31 Breach occurred
- 2017-05-31 Publicly disclosed
- 2017-05-31 Customers notified