logoalt Hacker News

pregnenolonetoday at 3:43 PM6 repliesview on HN

> KeePass users continue to live the stress free live.

https://cyberpress.org/hackers-exploit-keepass-password-mana...


Replies

pertiquetoday at 4:01 PM

This article is borderline malicious in how it skirts the facts.

This wasn't a case where KeePass was compromised in any way, as far as I can tell. This appears to be a basic case of a threat actor distributing a trojanized version via malicious ads. If users made sure they are getting the correct version, they were never in danger. That's not to say that a supply chain attack couldn't affect KeePass, but this article doesn't say that it has.

dspilletttoday at 4:03 PM

That looks like you'd have to download and run a hacked installer that was never avaliable from an official location. That is a much lower risk than a supply-chain attack where anyone building birwarden-cli from the official repo would be infected via the compromised dependency.

Long term keepass users aren't going to be affected. If you mention software to others make sure you send them a link to a known safe download location instead of having them search for one (as new users searching like that are more at risk of stumbling on a malicious copy of the official site hosting a hacked version).

derkadestoday at 3:56 PM

This AI generated article is not about vulnerabilities in KeePass, rather about malicious KeePass clones.

baby_souffletoday at 3:48 PM

Happy 1password user for more than a decade.

It's only a matter of time until _they_ are also popped :(.

jaxefayotoday at 4:45 PM

I think most people use keepassxc, not original keepass.

hypeateitoday at 3:56 PM

That's an AI slop article. I'm not sure how someone creating their own installer and buying a few domains to distribute it is a mark against KeePass itself.

> The beacon established command and control over HTTPS