Over the weekend, Citrix informed users of its remote access software GoToMyPC that their passwords have been reset due to what the company calls a “very sophisticated password attack.”
The company’s security team has decided that resetting the passwords of all customer accounts is the best way to address the issue. Users have been advised to set strong, unique passwords and enable two-step verification on their accounts to prevent unauthorized access.
GoToMyPC customers can reset their passwords using the regular “Forgot Password” feature, or by calling GoToMyPC support if they don’t have access to their email account.
The attackers leveraged credentials leaked recently from major websites to access GoToMyPC accounts. These types of attacks are often automated and they can be highly efficient considering that many people set the same password for multiple online services.
“Citrix takes the safety and security of its customers very seriously, and is aware of the password attack on GoToMyPC. Once Citrix learned about the attack, it took immediate action to protect customers. Citrix can confirm the recent incident was a password re-use attack, where attackers used usernames and passwords leaked from other websites to access the accounts of GoToMyPC users,” John Bennett, Product Line Director at Citrix, told SecurityWeek.
“At this time, the response includes a mandatory password reset for all GoToMyPC users. Citrix encourages customers to visit the GoToMyPC status page to learn about enabling two-step verification, and to use strong passwords in order to keep accounts as safe as possible. Further, there is no indication of compromise to any other Citrix product line,” Bennett added.
Password reuse attacks are usually not very sophisticated, but they have been successful against several popular services over the past few weeks, including GitHub, Facebook, Netflix, Reddit, TeamViewer and Twitter.
In TeamViewer’s case, some users claimed that they had unique passwords for the software and they still got hacked, but the vendor insisted that its own systems had not been breached.
Malicious actors have been using credentials leaked recently from companies such as LinkedIn, Myspace, Tumblr and VK. Despite the fact that the breaches occurred in 2011-2013, there are hundreds of millions of compromised credentials and many of them are apparently still valid.
*Updated with statement from Citrix
Related Reading: 45 Million Potentially Impacted by VerticalScope Hack
Related Reading: Microsoft May Ban Your Favorite Password

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
