The SSO company that owned the OneLogin Password Manager was hacked by hackers!
In a brief post on their blog, the company's chief security officer, Alvaro Hoyos, said he had "detected unauthorized access to OneLogin data on US servers."
The blog post does not contain any more information or technical details about the incident, and fails to report whether the hackers have intercepted sensitive customer data of the company, which refers only to the email sent to the company by e-mail to its customers , according to ZDNet.
"OneLogin believes that all customers served by the US data center are affected and customer data may have been leaked," the email said.
Hackers are not able to decrypt the encrypted data, says a company support page that only OneLogin customers have access to (a copy of the publication there is in pastebin).
The company advises its customers to change their passwords, create new API keys for their services, and create new OAuth Tokens they use to link to their accounts. He also says that they need to create new security certificates. The company also reported that the information stored in Secure Notes mode, used by IT administrators for storing sensitive network passwords, can be decrypted.
Of course, questions remain about how hackers managed to gain access to such sensitive data, and why it can be decrypted.
OneLogin allows corporate users to access many web applications, websites and services with a single password. It is believed that the company has millions of users and serves more than 2.000 companies in dozens of countries, according to CrunchBase.
The company provides seamless connectivity to hundreds of different third-party applications and services, including Amazon Web Services, Microsoft Office 365, LinkedIn, Slack, Twitter, and Google υπηρεσίες.