Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

GoToMyPC Resets All User Passwords After Attack

Over the weekend, Citrix informed users of its remote access software GoToMyPC that their passwords have been reset due to what the company calls a “very sophisticated password attack.”

Over the weekend, Citrix informed users of its remote access software GoToMyPC that their passwords have been reset due to what the company calls a “very sophisticated password attack.”

The company’s security team has decided that resetting the passwords of all customer accounts is the best way to address the issue. Users have been advised to set strong, unique passwords and enable two-step verification on their accounts to prevent unauthorized access.

GoToMyPC customers can reset their passwords using the regular “Forgot Password” feature, or by calling GoToMyPC support if they don’t have access to their email account.

The attackers leveraged credentials leaked recently from major websites to access GoToMyPC accounts. These types of attacks are often automated and they can be highly efficient considering that many people set the same password for multiple online services.

“Citrix takes the safety and security of its customers very seriously, and is aware of the password attack on GoToMyPC. Once Citrix learned about the attack, it took immediate action to protect customers. Citrix can confirm the recent incident was a password re-use attack, where attackers used usernames and passwords leaked from other websites to access the accounts of GoToMyPC users,” John Bennett, Product Line Director at Citrix, told SecurityWeek

“At this time, the response includes a mandatory password reset for all GoToMyPC users. Citrix encourages customers to visit the GoToMyPC status page to learn about enabling two-step verification, and to use strong passwords in order to keep accounts as safe as possible. Further, there is no indication of compromise to any other Citrix product line,” Bennett added.

Password reuse attacks are usually not very sophisticated, but they have been successful against several popular services over the past few weeks, including GitHub, Facebook, Netflix, Reddit, TeamViewer and Twitter.

In TeamViewer’s case, some users claimed that they had unique passwords for the software and they still got hacked, but the vendor insisted that its own systems had not been breached.

Advertisement. Scroll to continue reading.

Malicious actors have been using credentials leaked recently from companies such as LinkedIn, Myspace, Tumblr and VK. Despite the fact that the breaches occurred in 2011-2013, there are hundreds of millions of compromised credentials and many of them are apparently still valid.

*Updated with statement from Citrix

Related Reading: 45 Million Potentially Impacted by VerticalScope Hack

Related Reading: Microsoft May Ban Your Favorite Password

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.