Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

Password

Privacy and security on the internet
Gaming Gear

You May Not Want to Use Your Password Manager’s Auto-Fill. Here’s Why and What to Do Instead

by admin August 22, 2025


A reliable password manager is one of our essential recommendations as part of your cybersecurity toolkit, alongside a VPN and antivirus software. However, a Czech Republic-based security researcher, Marek Tóth, recently revealed at Defcon 33 that a clickjacking attack could be used to steal data from several password managers. Data that could be captured from your password manager through a specific clickjacking attack includes credit card information, personal data, usernames and passwords, passkeys or time-based one-time passwords. 

Here’s what you need to know, including how the vulnerability works, which password managers are currently susceptible and what you can do to stay safe.

A web-based clickjacking attack could be used to capture sensitive data from password managers

Clickjacking is an attack that relies on a user carrying out an action — like clicking on a button — with the belief that the user is performing one thing when they’re really doing something else. For example, you might see a button on a website encouraging you to download a plugin or firmware update, but instead of downloading whatever’s being promised, it actually sends you a web page or app run by an attacker. Clickjacking can be used to capture your data, like usernames, passwords and banking information.

According to Tóth’s research, some password managers are susceptible to an exploit that could mean that if you unwittingly click on a web-based element that’s part of an attacker’s clickjacking scheme, your usernames, passwords and even banking information could be shared. For instance, you might click on what you think is an innocent CAPTCHA, and while you’re solving the clickjacking CAPTCHA, your password manager autofill launches, selects all of your saved items and sends that data to an attacker. But as Tóth demonstrated, you won’t see your password manager auto-fill launching, because the attacker’s site has set the opacity such that your password manager’s windows are invisible to you. 

This isn’t really a password manager-specific vulnerability, but a web-based attack 

While Tóth demonstrated how a Document Object Model, or DOM, based attack could be used to execute malicious code in your browser, it’s technically a web-based attack that websites and browsers are susceptible to, not a vulnerability exclusive to password managers. Tóth provides potential solutions for mitigating the vulnerability, and states that “the safest solution is to display a new pop-up window” when auto-fill happens, although he concedes “…that will be very inconvenient for users.” There’s currently some online debate — 1Password told the Socket Security Team that it feels that some of Tóth’s proposed solutions could be circumvented easily, and that a pop-up informing users before auto-filling would be the only way to truly warn against a clickjacking attack.

At the time of writing, NordPass, ProtonPass, RoboForm, Keeper and Dashlane have implemented fixes. LastPass has implemented certain mitigations, including a pop-up notification that shows up before auto-filling personal details and credit card information. Bitwarden, Enpass and iCloud Passwords reportedly have in-progress fixes coming, while 1Password and LogMeOnce don’t yet.

Here’s what you can do to stay safe

The good news is that several password managers have already taken action, with patches rolled out from NordPass, ProtonPass, Keeper and RoboForm. But you’ll want to make sure you’re using the latest version of each app to ensure you’ve got the patch fix installed. 

Because clickjacking isn’t a unique attack to password managers, you’ll want to exercise good judgment and caution. Be careful with pop-ups, banner ads and CAPTCHAs, especially if they seem suspicious. You can try hovering your cursor over on-page elements without clicking, and the bottom of your web browser window should show you the link awaiting you, so you can see if it seems legitimate.

Since the clickjacking attack relies on auto-fill, you could disable your password manager’s auto-fill settings, instead relying on copying and pasting your various account credentials. That way, if you fall prey to a clickjacking attack that tries to auto-fill information from your password manager, it may not be successful.

If you’re concerned that your passwords have been compromised, you can make new ones. Most password managers include password generators, but if you’d prefer to create your own, I recommend abiding by the US Cybersecurity and Infrastructure Security Agency’s recommendations to make your passwords at least 16 characters long, including a mix of letters, numbers and special characters. 

In addition to a password manager, you should be using a VPN when you’re worried about privacy — like hiding your web browsing and app activity from your ISP — as well as antivirus software. Many VPNs and antivirus apps include ad, tracker and pop-up blockers, which may help protect against malicious sites or links. You can often bundle cybersecurity software for a convenient package, although there are pros and cons to bundling. While we typically advise against many free services, we do vouch for select free VPNs and antivirus software.

Although I don’t think you need to panic and jump ship, if you’re truly concerned, you can always switch to a password manager that’s rolled out a patch. 

For more, learn why you should be using a password manager and how to set one up.



Source link

August 22, 2025 0 comments
0 FacebookTwitterPinterestEmail
Us Bitcoin Etf Inflows Hit $2.4B In 8 Days, Btc Price To Rally
Crypto Trends

Binance’s CZ Proposes Fix for Google, Apple, Meta’s 16B Password Leak

by admin June 19, 2025



A huge data breach has shaken the internet after researchers working with Cybernews found over 16 billion login credentials exposed. These credentials come from major platforms like Google, Apple, Meta (Facebook), and many others. This is the largest breach of its kind ever discovered.

A lot of details were linked, including real usernames, passwords, cookies, and metadata, all neatly organized and ready to be used by hackers. According to researcher Vilius Petkauskas, these details are clean and organized, most of them have never been seen before, which means hackers can easily use them with hacking tools.

The researchers found 30 big files, with each one holding between millions to billions of records. One file had more than 3.5 billion passwords by itself. Only one of the 30 files had been shared before. The rest are all new.

These records could unlock personal emails, social media, and even government systems, which makes the situation even more dangerous. The ones with the highest risk are people who use cryptocurrency. If the hacker could manage to gain access to their emails, they could reset their passwords and take over their crypto accounts.

Some wallets also store keys or recovery phrases in cloud services. If attackers find those, they can steal the funds instantly. This may even lead to more targeted hacks and phishing scams.

Binance founder Changpeng Zhao (CZ) reacted to the news on X, posting: “That’s 2 passwords per person for the planet. Use a different password for each site, and hopefully a different email address too. And use a hardware 2FA device!” What he means is that everyone should update their login info and add extra layers of protection.

CZ advises using 2-factor authentication | Source: X

The leaked credentials also include logins to tools like GitHub, Telegram, VPNs, and developer portals, which could lead to even bigger cyberattacks on companies.

Security expert Darren Guccione, CEO of Keeper Security, said this shows how poor cloud security still is. “This could be just the tip of the biggest security iceberg,” he warned.

Researchers say the data was likely taken using infostealer malware and not from public leaks. The breach affects people and companies worldwide. Everyone is advised to change their passwords, avoid reusing them, and turn on two-factor authentication.

Also Read: Israeli Hackers Leak Nobitex Source Code After $100M Crypto Heist



Source link

June 19, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (557)
  • Esports (404)
  • Game Reviews (356)
  • Game Updates (478)
  • GameFi Guides (544)
  • Gaming Gear (506)
  • NFT Gaming (551)
  • Product Reviews (494)

Recent Posts

  • Blue-Chip NFTs Tumble as ETH Retreats From All-Time Highs
  • Tokyo’s Monex Considers Launching Domestic Yen Stablecoin
  • Ethereum, ETH Treasuries at ‘Good Entry Point’ After Market Pullback: Standard Chartered
  • Sony finally makes the PlayStation refund process easier, killing the support chat bot
  • Gemini image generation is adding more editing tools

Recent Posts

  • Blue-Chip NFTs Tumble as ETH Retreats From All-Time Highs

    August 26, 2025
  • Tokyo’s Monex Considers Launching Domestic Yen Stablecoin

    August 26, 2025
  • Ethereum, ETH Treasuries at ‘Good Entry Point’ After Market Pullback: Standard Chartered

    August 26, 2025
  • Sony finally makes the PlayStation refund process easier, killing the support chat bot

    August 26, 2025
  • Gemini image generation is adding more editing tools

    August 26, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Blue-Chip NFTs Tumble as ETH Retreats From All-Time Highs

    August 26, 2025
  • Tokyo’s Monex Considers Launching Domestic Yen Stablecoin

    August 26, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close