There are other considerations besides the recent revelations about recovery tools being discussed in this thread...
http://arstechnica.com/security/2014/11/citadel-attackers-aim-to-steal-victims-master-passwords/ The research<http://securityintelligence.com/cybercriminals-use-citadel-compromise-password-management-authentication-solutions/> found that a configuration file, which attackers use to tailor the Citadel trojan for specific campaigns, had been modified to start up a keylogger when the user opened either Password Safe or KeePass, two open-source password managers. While malware has previously targeted the credentials stored in the password managers included in popular Web browsers, third-party password managers have typically not been targeted. While the current impact of the attack is low, the implications of the attacker's focus is that password managers will soon come under more widespread assault, From: [email protected] [mailto:[email protected]] On Behalf Of John Gwinner Sent: Friday, December 12, 2014 11:42 AM To: [email protected] Subject: RE: [NTSysADM] Did you think your KeePass Master Passwords were safe? PWSafe follow up How about PWSafe? (http://pwsafe.org<https://urldefense.proofpoint.com/v2/url?u=http-3A__pwsafe.org_&d=AAQFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=cgY5KFatybgsA9RzBafEwGficJfBtl-IEye8NuElUtg&e=>) I'm thinking of rolling that out to my DBA's. The files would stay on the company intranet, and I'd use Yubico for THEM to access, keep the sw password to just 2 people (IT guy and myself). Having an issue getting Yubico to work, that's a separate issue. == John == John Gwinner | Director of Technology DAZSI /Oracle Business Applications 310.640.1300 (office) | 310.227.9140 (cell) 880 Apollo Street - Ste. 201 | El Segundo CA 90245 [Description: cid:[email protected]]<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.dazsi.com_&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=GjZRQ4raQi5i6lyfpj28BDeEIxLVPapOz9shFpRVyX0&e=> From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Andrew S. Baker Sent: Wednesday, December 10, 2014 3:52 PM To: ntsysadm Subject: Re: [NTSysADM] Did you think your KeePass Master Passwords were safe? Too true... ASB http://XeeMe.com/AndrewBaker<https://urldefense.proofpoint.com/v2/url?u=http-3A__xeeme.com_AndrewBaker&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=591UUFMOyj9QXaPQWHtVP0XIaa9w7UDXb6qo2hKOfqs&e=> Providing Virtual CIO Services (IT Operations & Information Security) for the SMB market... On Tue, Dec 9, 2014 at 7:05 PM, Jon Harris <[email protected]<mailto:[email protected]>> wrote: Too bad the company does not work to de-encrypt CryptoWall encrypted files! Jon ________________________________ From: [email protected]<mailto:[email protected]> To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] Did you think your KeePass Master Passwords were safe? Date: Tue, 9 Dec 2014 23:58:17 +0000 No longer.... http://www.lostpassword.com/news/pnl74.htm<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.lostpassword.com_news_pnl74.htm&d=AAMFAg&c=hLS_V_MyRCwXDjNCFvC1XhVzdhW2dOtrP9xQj43rEYI&r=TA_mjBT8bS0r8rLrnubGjA&m=OfcDFpkhacTxNVIMQpbHV8yFRAv1UD0qikoytdKzUro&s=ERU4RReY5pr28Xg0DQ0aNO8ec6qyn5eais78Ivl4gqM&e=> (h/t Susan Bradley - who was more concerned about QuickBooks.) :) PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/

