More stories

  • in

    Asia most targeted region in 2021, taking on one in four cybersecurity attacks

    Asia was the most targeted region last year, accounting for one in four cybersecurity attacks launched worldwide. Japan, Australia, and India experienced the most incidents in the region, where server access and ransomware were amongst the most popular forms of attacks.Financial services and manufacturing organisations also bore the brunt of attacks in Asia, taking on almost 60% of such incidents, according to IBM’s annual X-Force Threat Intelligence Index. IBM Security monitors 150 billion security events daily across more than 130 countries, pulling from data sources such as network and endpoint detection devices, incident response engagements, and phishing kit tracking. Finance and insurance companies, in particular, took on 30% of attacks IBM was able to remediate. Manufacturing organisations bore 29% of attacks in the region, followed by professional and business services at 13% and the transport sector at 10%.

    Asia took on 26% of cybersecurity attacks IBM observed globally. Japan, in particular, saw significant activities that the tech vendor attributed to the Summer Olympic Games, which were held in Tokyo last July. Europe and North America received 24% and 23%, respectively, of attacks launched last year, while the Middle East and Africa took on 14% and Latin America received 13%.  In Asia, server access attacks and ransomware were the top two forms of attacks last year, accounting for 20% and 11%, respectively, of all incidents. Data theft came in third at 10%, while remote access trojans and adware each accounted for 9% of attacks. The high portion of server access attacks might point to Asian organisations’ ability to identify such attacks quickly before they escalated to more critical forms of attacks, IBM noted. It added that REvil accounted for 33% of ransomware attacks in Asia, with others such as Bitlocker, Nefilim, MedusaLocker, and Ragnar Locker also surfacing last year.Hackers also looked to exploit vulnerabilities and tapped phishing as a way to breach businesses in Asia, with both tied as the top infection vectors contributing to 43% of attacks. Brute force was used in 7% of attacks while another 7% of hackers used stolen credentials to gain initial access to networks.  Worldwide, IBM said there was a 33% climb in attacks brought about by vulnerability exploitation of unpatched software. This led to 44% of ransomware attacks carried out last year. Unpatched vulnerabilities in manufacturing companies, specifically, resulted in 47% of attacks. This vertical experienced the most attacks last year, taking on 23% of the overall global count. Financial services and insurance previously had been the most targeted industry, according to IBM. “Experiencing more ransomware attacks than any other industry, attackers wagered on the ripple effect that disruption on manufacturing organisations would cause their downstream supply chains to pressure them into paying the ransom,” the report noted. It stressed the need for enterprises to prioritise vulnerability management to mitigate security risks. Unpatched vulnerabilities led to half of attacks in Asia, Europe, and MEA last year. According to IBM, ransomware remained the top attack method in 2021. In addition, the average lifespan of a ransomware group before it shuttered or rebranded was estimated to be 17 months. The report pointed to REvil, which was responsible for 37% of all ransomware attacks in 2021 and had operated for four years through various rebrands. This suggested the likelihood it had resurfaced despite its takedown in an operation involving multiple governments in mid-2021.Hackers also had their eyes on cloud environments. The number of new Linux ransomware code climbed 146% last year alongside a shift in target focus towards Docker containers. These activities could make it easier for more threat actors to tap cloud platforms for malicious purposes, IBM warned. RELATED COVERAGE More

  • in

    Fortinet: Log4j had nearly 50x activity volume of ProxyLogon

    Cybersecurity giant Fortinet found that Log4j had nearly 50 times the activity volume compared to ProxyLogon based on peak 10-day average volume in the second half of 2021. The finding was part of the company’s FortiGuard Labs Global Threat Landscape Report released this week. The Fortinet report also spotlighted attacks on Linux systems, many of which come in the form of executable and linkable format (ELF) binaries.”The rate of new Linux malware signatures in Q4 quadrupled that of Q1 2021 with ELF variant Muhstik, RedXOR malware, and even Log4j being examples of threats targeting Linux. The prevalence of ELF and other Linux malware detections doubled during 2021,” the report explained. “This growth in variants and volume suggests that Linux malware is increasingly part of adversaries’ arsenal.”
    Fortinet
    Threat actors are also evolving their use of botnets beyond DDoS attacks. Instead of being “primarily monolithic,” Fortinet said botnets “are now multipurpose attack vehicles leveraging a variety of more sophisticated attack techniques, including ransomware.” “For example, threat actors, including operators of botnets like Mirai, integrated exploits for the Log4j vulnerability into their attack kits. Also, botnet activity was tracked associated with a new variant of the RedXOR malware, which targets Linux systems for data exfiltration. Detections of botnets delivering a variant of RedLine Stealer malware also surged in early October morphing to find new targets using a COVID-themed file,” the report said. The report went into detail about how cyberattackers are maximizing attack vectors associated with remote work and learning. Fortinet saw an explosion in various forms of browser-based malware that appeared in the form of phishing lures as well as scripts that inject code or redirect users to malicious sites.

    more Log4j

    The researchers split the distribution mechanisms into three broad categories: Microsoft Office executables (MSExcel/, MSOffice/), PDF files, and browser scripts (HTML/, JS/).”Such techniques continue to be a popular way for cybercriminals to exploit people’s desire for the latest news about the pandemic, politics, sports, or other headlines, and to then find entryways back to corporate networks. With hybrid work and learning remaining a reality, there are fewer layers of protection between malware and would-be victims,” Fortinet said. When it comes to ransomware Fortinet said it continues to see a mix of new and old ransomware strains used in attacks.FortiGuard Labs said it “observed a consistent level of malicious activity involving multiple ransomware strains, including new versions of Phobos, Yanluowang and BlackMatter.” Researchers with Fortinet noted that the Log4j vulnerabilities and others were one example of how quickly cybercriminals and nation states move in exploiting widespread flaws. Derek Manky, chief of security insights and global threat alliances at FortiGuard Labs, said new and evolving attack techniques span the entire kill chain but especially in the weaponization phase, showing an evolution to a more advanced persistent cybercrime strategy that is more destructive and unpredictable.  More

  • in

    Cloudflare acquires Area 1 Security for $162 million

    Cloudflare announced on Wednesday that it is acquiring cybersecurity firm Area 1 Security for approximately $162 million. Area 1 Security has a cloud-native platform built to work alongside email programs to stop phishing attacks.Cloudflare said 40-50% of the $162 million price tag is payable in shares of Cloudflare’s Class A common stock. The acquisition will close in Q2. 

    Area 1 Security claims to have blocked more than 40 million “malicious phishing campaigns spanning business email compromise, malware, ransomware, and other advanced threats.” “Email is the largest cyber attack vector on the Internet, which makes integrated email security critical to any true Zero Trust network. That’s why today we’re welcoming Area 1 Security to help make Cloudflare’s platform the clear leader in Zero Trust,” said Matthew Prince, CEO of Cloudflare. “To us, the future of Zero Trust includes an integrated, one-click approach to securing all of an organization’s applications, including its most ubiquitous cloud application, email. Together, we expect we’ll be delivering the fastest, most effective, and most reliable email security on the market.”Area 1 Security CEO Patrick Sweeney added that by combining their phishing protection and threat intelligence capabilities with Cloudflare’s global network, data capabilities, and Zero Trust platform, they can help companies of any size better secure their entire network infrastructure.”Today, email is a business’ most-used cloud application. It’s unfortunately unprotected. We estimate that more than 90% of cyber security damages are the result of just one thing: phishing,” Sweeney said.Cloudflare recently launched an Advanced Email Security Suite as its first foray into email security in 2021. The company said Area 1 Security’s highly scalable technology and years of experience in email protection would enhance Cloudflare’s global networkIn a blog post, Cloudflare explained that they are constantly being attacked. “We have been using Area 1 for sometime to protect our employees from these attackers. In early 2020, our security team saw an uptick in employee-reported phishing attempts. Our cloud-based email provider had strong spam filtering, but fell short at blocking malicious threats and other advanced attacks. Additionally, our provider only offered controls to cover their native web application, and did not provide sufficient controls to protect their iOS app and alternate methods of accessing email,” Cloudflare said. “Clearly, we needed to layer an email security solution on top of their built-in protection capabilities.The team looked for four main things in a vendor: the ability to scan email attachments, the ability to analyze suspected malicious links, business email compromise protection, and strongAPIs into cloud-native email providers. After testing many vendors, Area 1 became the clear choice to protect our employees. We implemented Area 1’s solution in early 2020, and the results have been fantastic.” They went on to say that Area 1 helped them proactively identify phishing campaigns and contributed to a “significant and prolonged drop in phishing emails.”Area 1 has worked in the email security space for nine years and has a significant trove of threat intelligence data. “Area 1’s technology was so effective at launch, that our CEO reached out to our ChiefSecurity Officer to inquire if our email security was broken. Our CEO hadn’t seen any phishing attempts reported by our employees for many weeks, a rare occurrence. It turns out our employees weren’t reporting any phishing attempts, because Area 1 was catching all phishing attempts before they reached our employee’s inboxes,” the company added. 

    Tech Earnings More

  • in

    How Palo Alto Networks modernized its security management with AI

    The SIEM, or security information and event management console, has been a staple for security teams for more than a decade. It’s the single pane of glass that shows events, alerts, logs, and other information that can be used to find a breach. Despite its near ubiquity, I’ve long been a SIEM critic and believe the tool is long past its prime. This is certainly not the consensus; I’ve been criticized in the past for taking this stance. Legacy SIEMs are outdated 

    ZDNet Recommends

    The best security key

    While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.

    Read More

    The proof point I offer is the fact that whenever a breach occurs, the SIEM vendor claims to have seen it, yet the breach happened anyway. That was the case with many big-name businesses that suffered a newsworthy cyberattack. Target, Sony, and many others all echoed the same. The SIEM saw it, but the security team missed it. If SIEMs are so powerful, why does this continue to happen? The answer is that SIEMs can no longer keep up with the massive volumes of data that come into them and need to be correlated, sorted, and viewed in a way that helps security operations prioritize events. This can help separate an actual breach from a false positive. Many security pros have told me their SIEM shows so much info now that they ignore much of it. In a sense, too much information is as useful as no information.Palo Alto introduces an AI-powered operations tool This week, Palo Alto Networks introduced its Cortex XSIAM (eXtended Security Intelligence and Automation Management), which can be viewed as a modernized SIEM with an infusion of artificial intelligence. The concept of the XSIAM is that it uses AI to separate the threats from the noise in the immense amounts of telemetry data generated by infrastructure today. If done correctly, this would accelerate threat identification, which in turn, speeds up threat response. The infusion of AI into security is something that has been badly needed for some time. There are still some people opposed to it, and the thought of taking the analytic process out of people’s hands and trusting machines, in reality, can be scary. The truth is the bad guys are using AI. Using people to fight threat actors armed with machine learning is akin to bringing a knife to a gunfight. It’s time to fight fire with fire, and that means accepting that AI needs to be a key part of cybersecurity moving forward. 

    One of the major differences between a traditional SIEM and Cortex XSIAM is that the latter collects granular telemetry information, not just logs and alerts. This is where AI can add value as it can drive natively autonomous response actions, such as cross-correlation of alerts and data, detection of sophisticated emerging threats, and automated remediation based on threat intelligence and attack surface data. Security platforms are the way forward The release of Cortex XSIAM is a direct result of the security platform that Palo Alto Networks has built. Historically, security pros have used best-of-breed point products to secure specific points in the environment. This is why, according to ZK Research, the average enterprise has 32 security vendors, with some reporting more than 100. One of the three-letter U.S. government agencies told me it has more than 200. CISOs are now starting to understand that this strategy does not work. One CISO stated that best of breed everywhere does not lead to best-in-class threat protection. In fact, it creates suboptimal protection because it becomes impossible to manage security policies across the various vendors. I do not believe we can ever have one vendor to handle everything, but businesses do need to pick a single open-platform vendor that has a strong foundation in networking, cloud, and endpoint, and then augment that with technologies that interoperate with that platform. This has been the vision on which Palo Alto has been working. The first proof point for validating the value of the platform was the release of Palo Alto’s XDR solution. In 2018, I authored this post, proclaiming XDR to be the evolution of EDR. My thesis at the time was that looking at endpoint data in isolation wasn’t enough; XDR rolls up data from across the infrastructure to see things EDR can’t. The release of Cortex XSIAM follows the same thought process. SIEMs use limited data, and manual analytics and are no longer a viable way of finding threats. This model has not worked, is not working, and won’t ever work. Security teams need an operations tool that uses AI-based analytics, which pulls granular data from across the platform to combat today’s highly advanced threat actors. More

  • in

    Asustor warns users of Deadbolt ransomware attacks

    Users of Asustor Network Attached Storage (NAS) devices are being warned of potential Deadbolt ransomware infections after dozens of people took to Reddit and other message boards to complain of attacks. Asustor Marketing Manager Jack Lu told ZDNet that the company is “going to release a recovery firmware for support engineers today for users whose NAS is hacked so they can use their NAS again.” 

    ZDNet Recommends

    The best network-attached storage devices

    If cloud-based servers don’t meet all of your storage needs, consider a NAS solution. We selected a handful of devices that passed our reliability torture tests and offer superior usability and feature sets.

    Read More

    “However, encrypted files can not be recovered unless users have backups,” Lu added. Asustor released a warning on Wednesday that the Deadbolt ransomware was being used in attacks affecting Asustor devices. It announced that the myasustor.com DDNS service will be disabled while the issue is investigated.The company recommends users change default ports, including the default NAS web access ports of 8000 and 8001 as well as remote web access ports of 80 and 443. Users should also Disable EZ Connect, make immediate backups, and turn off Terminal/SSH and SFTP services.Asustor also provided a more detailed guide for users in need of more help. If you have already been hit by Deadbolt ransomware, you should unplug the Ethernet network cable and shut down your NAS by pressing and holding the power button for three seconds.Users are urged to fill out this form and make sure not to initialize their NAS because it will erase their data.The New Zealand CERT released its own lengthy warnings about Deadbolt this week, writing that vulnerabilities in QNAP and Asustor NAS devices are being actively exploited to deploy ransomware. The US Cybersecurity and Infrastructure Security Agency declined to comment.QNAP released its own Deadbolt guidance last month and took several controversial measures to limit the spread of the ransomware. CERT NZ said users should follow the guidance provided by both companies about how to protect their devices. But it noted that both are “being actively targeted by attackers intending to deploy ransomware.”It said QNAP NAS devices that are internet exposed and running QTS and QuTS operating systems, or add-ons with the following versions, are affected:QTS 5.0.0.1891 build 20211221 and laterQTS 4.5.4.1892 build 20211223 and laterQuTS hero h5.0.0.1892 build 20211222 and laterQuTS hero h4.5.4.1892 build 20211223 and laterQuTScloud c5.0.0.1919 build 20220119 and laterAffected Asustor devices that are internet exposed and running ADM operating systems include the AS5104T, AS5304T, AS6404T, AS7004T, AS5202T, AS6302T, and AS1104T models. 

    Users have reported seeing the same ransom messages that were deployed last month when QNAP devices were hit. The Deadbolt ransomware group demanded 0.03 bitcoins (BTC) in exchange for the decryption key. In another note to Asustor, the ransomware group offers to provide the company with information about the alleged zero-day vulnerability they used to attack in exchange for 7.5 BTC. The group is also offering a master decryption key for 50 BTC, worth $1.9 million. For QNAP, the group demanded a payment of 5 BTC in exchange for details about the alleged zero-day and 50 BTC for a universal decryption master key.As users wait for the firmware to be released, some are warning users to make a backup of the locked files. QNAP’s firmware removed the ransom note that is needed to get and use the decryption key. Both the decryption tools from Deadbolt and security company Emsisoft require the original ransom note. It is unclear how many Asustor users are affected by the ransomware. Censys reported last month that of the 130,000 QNAP NAS devices that were potential targets, 4,988 “exhibited the telltale signs of this specific piece of ransomware.”Censys later told ZDNet that the number of exposed and infected devices was around 3,927.  More

  • in

    Ukrainian gov't sites disrupted by DDoS, wiper malware discovered

    Ukraine’s State Service of Special Communications and Information Protection said a number of government websites and banks are dealing with a “massive DDoS attack” as the country prepares for a potential invasion by Russian-backed forces.   The websites for the Ministry of Foreign Affairs, Ministry of Defense, Ministry of Internal Affairs, Security Service (SBU) and Cabinet of Ministers all faced outages confirmed both by the State Service of Special Communications and Information Protection and Netblocks, an organization tracking internet outages around the world. 

    ⚠️ Confirmed: #Ukraine’s Ministry of Foreign Affairs, Ministry of Defense, Ministry of Internal Affairs, the Security Service of Ukraine and Cabinet of Ministers websites have just been impacted by network disruptions; the incident appears consistent with recent DDOS attacks 📉 pic.twitter.com/EVyy7mzZRr— NetBlocks (@netblocks) February 23, 2022

    PrivatBank, the largest commercial bank in Ukraine, and Oschadbank, the State Savings Bank of Ukraine, both dealt with outages too. Cloudflare told ZDNet that they have seen sporadic DDoS activity in Ukraine. “We’ve seen more DDoS activity this week than last week, but less than a month ago. There have been attacks against individual websites in Ukraine which have been disruptive,” a Cloudflare spokesperson said. “So far they have been relatively modest compared to large DDoS attacks we’ve handled in the past.”A screenshot of the message left on the Privatbank website. 
    Netblocks
    “Today, websites of a number of government and banking institutions have undergone a massive DDoS attack again. Some of the attacked information systems are not available or work intermittently. This is due to switching traffic to another provider to minimize damage. Other websites effectively resist the attack and work normally,” the Service of Special Communications and Information Protection said in a statement. “Currently, the State Service of Special Communications and Information Protection of Ukraine and other subjects of the national cybersecurity system are working on countering the attacks, collecting and analyzing information. We ask all authorities that have been attacked or are suspected to have been attacked to contact the Government Computer Emergency Response Team CERT-UA.”Later in the day, researchers at ESET discovered a new data wiper malware used in Ukraine. ESET telemetry allegedly showed that the wiper was installed on hundreds of machines.”The wiper abuses legitimate drivers from the EaseUS Partition Master software in order to corrupt data. As a final step the wiper reboots the computer,” ESET said.”In one of the targeted organizations, the wiper was dropped via the default (domain policy) GPO meaning that attackers had likely taken control of the Active Directory server.”

    As many have noted online, the attack began around 4pm local time, right as Ukraine’s parliament began to discuss a state of emergency declaration. The 30-day state of emergency was approved by the Ukrainian government as both US and NATO warned that a Russian invasion is likely. Russian forces moved into eastern parts of the country over the last two days. Ukrainian journalists reported that Ruslan Stefanchuk, the chairman of parliament, said he and his family were repeatedly hit with cyberattacks. Hackers allegedly attempted to get into their email accounts, block access to their bank accounts and more, according to Kyiv Independent reporter Anastasiia Lapatina. Many of the same websites were attacked last week in a series of DDoS incidents that the US attributed to Russia. The UK Foreign, Commonwealth & Development Office added that the Russian Main Intelligence Directorate (GRU) was involved in the attack. US Deputy National Security Advisor for Cyber Anne Neuberger told the press that they have technical information showing that “GRU infrastructure was seen transmitting high volumes of communication to Ukraine-based IP addresses and domains.”In a detailed breakdown of that DDoS incident, CERT-UA said the attacks involved both the Mirai and Meris botnets and included a supplementary SMS disinformation message campaign. That attack followed the defacement of more than 70 Ukrainian government websites in January. Christian Sorensen, former leader of the international cyber warfare team at US CYBERCOM, said these attacks are designed to ratchet up attention and pressure. “It doesn’t sound like much impact yet. In the coming hours/days, I would anticipate more activities to isolate and disrupt Ukrainian citizens and especially government activities,” said Sorensen, who is now CEO of cybersecurity firm SightGain. “The purpose at this stage is to cause chaos and seed doubt in the government and economy. Next stage will be impactful and continue deterrence for other countries to get involved.” More

  • in

    Security warning: Hackers are using this new malware to target firewall appliances

    Hackers linked to the Russian military are exploiting security vulnerabilities in firewalls to compromise network and infect them with malware, allowing them to remotely gain access. An alert by the UK National Cyber Security Centre (NCSC), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) has detailed the new malware, Cyclops Blink, attributing it to Sandworm, an offensive hacking operation they’ve previously linked to Russia’s GRU.Analysis by the NCSC describes Cyclops Blink as a “a highly sophisticated piece of malware” which has been “professionally developed”.Cyclops Blink appears to be a replacement for VPNFilter, malware which was used by state-linked Russian hacking groups in widespread attacks used to compromise network devices, predominantly routers, in order to access networks.According to the NCSC, CISA, FBI and NSA, Cyclops Blink has been active since at least June 2019, and like VPNFilter before it, the targeting is described as “indiscriminate and widespread” with the ability to gain persistent remote access to networks.It can also upload and download files from infected machines and it’s modular, allowing new functionality to be added to malware which is already running. SEE: Cybersecurity: Let’s get tactical (ZDNet special report)The cyber attacks are primarily focused on WatchGuard firewall devices, but the agencies warned that Sandworm is capable of re-purposing the malware to spread it via other architectures and firmware. Cyclops Blink persists on reboot and throughout the legitimate firmware update process. It targets WatchGuard devices that were reconfigured from the manufacturer default settings to open remote management interfaces to external access.An infection doesn’t mean the organisation is the primary target, but it’s possible that infected machines could be used to conduct additional attacks. The NCSC urges affected organisation to take steps to remove the malware, which have been detailed by WatchGuard. “Working closely with the FBI, CISA, DOJ, and UK NCSC., WatchGuard has investigated and developed a remediation for Cyclops Blink, a sophisticated state-sponsored botnet, that may have affected a limited number of WatchGuard firewall appliances,” said a WatchGuard statement. “WatchGuard customers and partners can eliminate the potential threat posed by malicious activity from the botnet by immediately enacting WatchGuard’s 4-Step Cyclops Blink Diagnosis and Remediation Plan,” it added. The NCSC warned that any passwords present on a device infected by Cyclops Blink should be assumed to be compromised and should be changed.Other advice about protecting networks from cyber attacks includes avoiding the exposure of management interfaces of network devices to the internet, keeping devices up to date with the latest security patches and using multi-factor authentication.  The NCSC notes that the advisory is not directly linked to the current situation in Ukraine.MORE ON CYBERSECURITY More

  • in

    Lose your keys to your Phantom crypto wallet? 1Password has you covered

    There are few scenarios more distressing than losing access to your bank account. One of these is losing the keys to your digital wallet. In order to alleviate that fear among crypto users, Toronto-based internet security company 1Password announced today that it is teaming up with crypto wallet Phantom to make it easier and safer for digital wallet holders to access their cryptocurrencies, NFTs and other digital assets.1Password’s first foray into the digital wallet arena is an application programming interface, or API, called Save in 1Password, which integrates with Phantom wallet so that users can protect and trade their tokens, NFTs and collectibles built on the Solana blockchain. With Save in 1Password, the company said, digital wallet holders can now save all Phantom wallet credentials and keys to 1Password without the hassle of logging on or the threat of losing access forever. “We just want to make it easier for people to protect their digital lives,” Matthew O’Leary, vice-president of partnerships at 1Password, told ZDNet.Unlike misplacing the password to an online checking account at your local bank, a password for a digital wallet – and a seed phrase used to reset a password – are the only ways to access one’s digital account. Lose them and you lose access to your digital coins and tokens; devise an easy-to-remember password and you run the risk of someone, or something, hacking into your account. Going to your bank and flashing your ID to access your digital wallet isn’t possible. The repercussions faced by losing a password specifically for your digital wallet were epitomized by San Francisco-based programmer – and early Bitcoin adopter – Stefan Thomas who, early last year, said he couldn’t remember the password to his digital wallet. As a result, he couldn’t get access to his Bitcoin wallet which had a value of [gasp] $220 million.HOW IT WORKSThe average person is expected to remember 100 passwords as they manage their digital lives, be it from bank and email accounts to social media and Netflix subscriptions. At a time when online security is paramount, people are burdened with having to create logins, passwords and two-factor authentication to access personal accounts and information. In the haste of getting online, countless many risk using the same password or the same pattern of words, numbers and symbols across accounts. “And that’s what we’re trying to guard against,” O’Leary told ZDNet. “Too many people end up reusing their password credentials.”  

    Based on its 15 years of providing password and security resources, 1Password’s entrance into the crypto market is a logical step. If you or your business needs to create an account for a crypto wallet, go to

    1Password’s website

    , key in your credit card information, and the sign-up flow begins. The service is available on all major computing and mobile platforms.When signing up for a Solana wallet, you’re asked to store a seed phrase that is required if you get locked out of your wallet and you need to log back in. The Save in 1Password API is integrated into the wallet, so when you’re going through the sign-up flow, you will be prompted by 1Password to automatically save that seed phrase within 1Password. “So instead of writing it down or printing it off and storing it somewhere that you won’t forget, it’s going to be stored directly in 1Password,” O’Leary said. “That just brings a lot more safety and a lot more security to people who are in droves weighing into crypto.” With more than 300 million people worldwide already invested in some form of cryptocurrency – and with that number projected to swell to 1 billion by 2023 – a lot of people new to crypto won’t necessarily understand the importance of storing a seed phrase; they might assume that they can contact a service for help in recovering that phrase. “You can’t do that in the crypto world,” O’Leary noted. “So backing that up in 1Password – that was the entire purpose of this integration,” he added.According to 1Password, to utilize this new integration, users will need to use both the Phantom extension and the 1Password browser extension. More