On April 24th, Clickstudios, the developer of PasswordState, communicated to their customers that a malicious update has been spread via their official channels. In this message, we want to warn you about the threat and inform you about the possible mitigation steps.
Clickstudios has published details about a supply-chain attack which happened between 20 April 2021 until 22 April 2021. During this period, a malicious update has been spread via the ‘In-Place’ update mechanism, which is responsible for updating the Passwordstate installation.
A technical detailled description can be found on the following blog posts in  and .
The malicious update contains a DLL which has a backdoor placed in it that decrypts all passwords saved within PasswordState, after which they get transmitted to a server of the attackers.
Thus, we estimate the impact as high.
Because the malicious update has been spread via the official channels of Clickstudios we estimate the risk as high.
What should you do?
If your company uses the PasswordState software, Northwave strongly recommends to check if the ‘In-Place’ update functionality has been used in the period of 20 April 2021 until and including 22 April 2021.
Furthermore, a strong indication that you have been compromised by this supply-chain attack is to check the file size of ‘moserware.secretsplitter.dll’, which can be found in the folder: ‘C:\inetpub\passwordstate\bin\’ – a folder located on the Passwordstate server.
If the size of this file is 65kb, then it’s likely that your passwords have been compromised.
If there is an indication or suspicion that you have fallen victim to this supply-chain attack, Northwave strongly recommends to reach out to our CERT immediately.
This will result in a fast and adequate response to this potential threat.