Home Many password managers vulnerable to AutoSpill attack on Android

Many password managers vulnerable to AutoSpill attack on Android

A team of researchers has uncovered a new vulnerability, dubbed “AutoSpill,” affecting several popular password managers on Android devices, according to a recent TechCrunch report. The vulnerability allows malicious apps to access users’ sensitive login credentials stored in password managers through exploiting the autofill function in Android’s WebView component.

According to Ankit Gangwal, Shubham Singh, and Abhijeet Srivastava from IIIT Hyderabad in India, the vulnerability works by tricking password managers into auto-filling credentials into an app’s native text fields when the app shows a login page through a WebView instead of launching an external web browser.

“Even without phishing, any malicious app that asks you to log in via another site, like Google or Facebook, can automatically access sensitive information,” explained Gangwal.

The researchers tested AutoSpill against leading password managers like 1Password, LastPass, Keeper, and Enpass on fully updated Android devices. They found most apps vulnerable even with JavaScript injection protections enabled. With JavaScript enabled, all tested password managers were susceptible.

The implications are serious considering the popularity of password managers to store sensitive login information for various online services. If exploited, the vulnerability provides malicious apps easy access to a treasure trove of usernames and passwords.

Gangwal disclosed the findings to both Google and the affected password manager developers. 1Password has acknowledged the vulnerability and claims to have identified a fix that will land in a future update. LastPass has also put mitigations in place. Other vendors have yet to publicly comment or confirm plans to address the issue.

The researcher team says they are still investigating whether a similar attack is possible on iOS devices. For now, Android users should be cautious about entering credentials into native app text fields, even if prompted by a WebView-based login page. As always, only install apps from trusted sources like the Google Play Store.

The AutoSpill research highlights the rising challenge of securing credentials across the modern app ecosystem. As login systems increasingly transition from web to in-app embedded browser flows, vulnerabilities like this demonstrate many risks are still being uncovered.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the gambling and blockchain industries for major developments, new product and brand launches, game releases and other newsworthy events. Editors assign relevant stories to in-house staff writers with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Radek Zielinski
Tech Journalist

Radek Zielinski is an experienced technology and financial journalist with a passion for cybersecurity and futurology.

Get the biggest iGaming headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Gambling News

    Explore the latest in online gambling with our curated updates. We cut through the noise to deliver concise, relevant insights, keeping you informed about the ever-changing world of iGaming and its most important trends.

    In-Depth Strategy Guides

    Elevate your game with tailored strategies for sports betting, table games, slots, and poker. Learn how to maximize bonuses, refine your tactics, and boost your chances to beat the house.

    Unbiased Expert Reviews

    Honest and transparent reviews of sportsbooks, casinos and poker rooms crafted through industry expertise and in-depth analysis. Delve into intricacies, get the best bonus deals, and stay ahead with our trustworthy guides.