25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

PasswordState Password Manager Supply Chain Attack Delivers Password-Stealing Malware

Password managers can greatly improve security. They help users create strong, difficult-to-guess passwords and store them in a secure vault. With a password manager, users do not have to remember their complex passwords, so they solve one of the most common password problems that can greatly reduce security – password reuse on multiple accounts. All users need to do is set and remember a single complex password to access their vault.

One problem with password managers is while they can improve security, the password vaults will be housed on a third-party server, so users are reliant on the security of the solution provider, although some providers offer a self-hosted solution. Many businesses feel more comfortable with this option and are confident in their ability to secure their own environments.

PasswordState from Click Studios is a self-hosted rather than cloud-hosted password management solution. While this can be more secure than a cloud-hosted solution, that does not mean breaches will not occur. Recently some users of the PasswordState solution discovered they had inadvertently installed malware when they installed a PasswordState update.

Between 4:33 pm ET on April 20 and 7 pm ET on April 21, 2021, PasswordState customers who installed an update received malware capable of exfiltrating password data, information on running processes, system configurations, and other sensitive data. The malware was configured to collect and exfiltrate data once a day.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Normally, the updater downloads additional files for PasswordState from Click Studio’s content delivery network (CDN) and performs the update; however, a threat actor had successfully compromised the in-place updater on Click Studio’s servers and modified it to also grab additional files from a third-party CDN – credential stealing malware.

It took Click Studios 28 hours to discover the breach, during which time the malware had been delivered to its customers. Fortunately, the small window of opportunity restricted the number of affected customers. Click Studios quickly addressed the problem and issued a hotfix to remove the malware and malicious files but since passwords were obtained, affected customers had to change all of their passwords. Click Studios said only “a small number” of customers had been affected.

Some customers were unhappy with the breach and took to social media networks to complain, with some also sharing photographs of the notifications they received from Click Studios. This gave the threat actor behind the campaign another opportunity.

The threat actor behind the attack was monitoring social media networks and used the information in the breach notice to craft a phishing campaign using the official Click Studio’s breach notification as a template with links to download a modified hotfix. Instead of getting the hotfix to remove malware, they received a modified hotfix that downloaded files from a CDN not under the control of Click Studios, which was used to deliver credentials stealing malware.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist