• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Bitwarden password vaults targeted in Google ads phishing attack

Lawrence Abrams by Lawrence Abrams
January 26, 2023
Reading Time: 5 mins read
0
Researchers secretly helped decrypt Zeppelin ransomware for 2 years

Hand holding a cyber key

RELATED POSTS

Sextortionists are making AI nudes from your social media images

Over 60,000 Android apps secretly installed adware for past six months

Outlook.com hit by outages as hacktivists claim DDoS attacks

Bitwarden and other password managers are being targeted in Google ads phishing campaigns to steal users’ password vault credentials.

As the enterprise and consumers move to use unique passwords at every site, it has become essential to use password managers to keep track of all the passwords.

However, unless you use a local password manager, like KeePass, most password managers are cloud-based, allowing users to access their passwords through websites and mobile apps.

These passwords are stored in the cloud in “password vaults” that keep the data in an encrypted format, usually encrypted using users’ master passwords.

Recent security breaches at LastPass and credential stuffing attacks at Norton have illustrated that a master password is a weak point for a password vault.

For this reason, threat actors have been spotted creating phishing pages that target your password vault’s login credentials, potentially authentication cookies, as once they gain access to these, they have full access to your vault.

Buy JNews
ADVERTISEMENT

Bitwarden users targeted by Google ads phishing

On Tuesday, Bitwarden users began seeing a Google ad titled ‘Bitward – Password Manager’ in search results for “bitwarden password manager.”

While BleepingComputer could not replicate this ad, it was seen by Bitwarden users on Reddit [1, 2] and the Bitwarden forums.

The domain used in the ad was ‘appbitwarden.com’ and, when clicked, redirected users to the site ‘bitwardenlogin.com.’

​

Bitwarden phishing site promoted via a Google ad
Bitwarden phishing site promoted via a Google ad
Source: Reddit

The page at ‘bitwardenlogin.com’ was an exact replica of the legitimate Bitwarden Web Vault login page, as seen below. 

Bitwarden phishing page
Bitwarden phishing page
Source: BleepingComputer

In our tests, the phishing page will accept credentials and, once submitted, redirect users to the legitimate Bitwarden login page.

However, our initial tests used fake credentials, and the page was shut down by the time we began testing with actual Bitwarden test login credentials.

Therefore, we were unable to see if the phishing page would also attempt to steal MFA-backed session cookies (authentication tokens) like many advanced phishing pages.

While many people feel that the URL was a dead giveaway that it was a phishing page, others couldn’t tell if it was fake or not.

“God damn. In situations like this how can I detect the fake one? This is truly scary,” said the poster of a Reddit topic about the phishing page.

“People are saying to look at the URL, maybe it’s just my tiny brain but I can’t tell which is the real one,” commented another user on the same Reddit post.

To make matters worse, it’s not only Bitwarden being targeted by malicious phishing pages in Google ads.

Security researcher MalwareHunterTeam also recently found Google ads targeting the credentials for the 1Password password manager.

1Password phishing page promoted on Google
1Password phishing page promoted on Google
Source: MalwareHunterteam

BleepingComputer has not been able to find other ads targeting other password managers, but Google search result advertisements have become a massive cybersecurity problem lately.

Recent research has shown that threat actors are using Google ads to fuel their malware delivery campaigns for initial access to corporate networks, to steal credentials, and for phishing attacks.

Protecting your password vaults

With password vaults containing some of your most valuable online data, it is important to properly protect them.

When it comes to protecting your password vaults from phishing attacks, the first line of defense is always to confirm you’re entering your credentials on the correct website.

However, in case you mistakenly enter your credentials on a phishing site, you should always configure multi-factor authentication with your password manager.

The best MFA verification methods to use when securing your account, from best to worst, are hardware security keys (best but most cumbersome), an authentication app (good and easier to use), and SMS verification (can be hijacked in sim swapping attacks).

Unfortunately, even with MFA protection, your accounts can still be vulnerable to advanced adversary-in-the-middle (AiTM) phishing attacks.

AiTM phishing attacks are when threat actors utilize specialized toolkits like Evilginx2, Modlishka, and Muraena to create phishing landing pages that proxy to legitimate login forms at a targeted service.

Using this method, visitors to the phishing page will see a legitimate service’s login form, such as Microsoft 365. When they enter their credentials and MFA verification codes, this information is also relayed to the actual site.

However, once a user logs in and the legitimate site sends the MFA-backed session cookie, the phishing toolkit can steal these tokens for later use.

The flow of an AiTM phishing attack
The flow of an AiTM phishing attack
Source: BleepingComputer

As these tokens have already been verified via MFA, they allow the threat actors to log in to your account without verifying MFA again.

Microsoft warned in July that this type of attack was used to bypass multi-factor authentication for 10,000 orgs.

Unfortunately, this leads us back to the first line of defense — make sure you only enter your credentials on a legitimate website or mobile app.

Share54Tweet34Pin12
Lawrence Abrams

Lawrence Abrams

Related Posts

FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

Sextortionists are making AI nudes from your social media images

June 6, 2023
Android file manager apps infect thousands with Sharkbot malware
Cyber Security

Over 60,000 Android apps secretly installed adware for past six months

June 6, 2023
Microsoft Outlook outage prevents users from sending, receiving emails
Cyber Security

Outlook.com hit by outages as hacktivists claim DDoS attacks

June 6, 2023
Microsoft to pay $20 million for XBOX children privacy violations
Cyber Security

Microsoft to pay $20 million for XBOX children privacy violations

June 6, 2023
Dissecting the Dark Web Supply Chain: Stealer Logs in Context
Cyber Security

Dissecting the Dark Web Supply Chain: Stealer Logs in Context

June 6, 2023
Android December 2022 security updates fix 81 vulnerabilities
Cyber Security

Android security update fixes Mali GPU flaw exploited by spyware

June 6, 2023

Recommended Stories

NSA shares tips on mitigating 5G network slicing threats

NSA shares tips on mitigating 5G network slicing threats

December 14, 2022
XRP traders can look for a risky buying opportunity at this support level

XRP traders can look for a risky buying opportunity at this support level

May 3, 2023
New Dark Power ransomware claims 10 victims in its first month

New Dark Power ransomware claims 10 victims in its first month

March 25, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • Zenit World introduces token rewards program to celebrate 80,000 registrations

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?