Saturday , May 10 2025
Samsung

Samsung phone is saving your passwords in plain text

You copy a password from your manager, thinking it’s safe. Meanwhile, your phone is saving it in plain text. Samsung says, so far, there is no solution.

Imagine you just copied a password or banking logins from a password manager. Then you think, “Wait, does this go away after I paste it?”

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Turns out, it doesn’t. The password you copied just sits there on your clipboard in plain text. Indefinitely.

“I copy passwords from my password manager all the time,” a user wrote on the US Samsung Community board.

“They’re long and complex… How is it that Samsung’s clipboard saves everything in plain text with no expiration? That’s a huge security issue.”

And the user is not wrong.

Samsung’s clipboard, baked deep into its One UI system, is a user interface developed by Samsung Electronics for its smart devices running Android 9 and later.

Clipboard logs everything you copy – passwords, bank info, private messages, that embarrassing breakup paragraph you never sent.

It doesn’t matter if you use Gboard, which is known to delete the clipboard within an hour, or a third-party keyboard – the history of your copy/pastes is still saved under Samsung’s jurisdiction. There’s no option to auto-delete it.

“There should at least be an option to auto-delete clipboard history after a few hours,” the user added.

“Right now, the only option is to manually go in and delete sensitive stuff… That’s wild,” the user complained

Samsung’s response:

“You’ve raised a valid concern… There’s no built-in setting to auto-delete clipboard contents after a certain period, which can indeed pose a security risk,” responded a Samsung moderator on the community board.

“We agree that adding options such as auto-clear clipboard after X minutes/hours or excluding sensitive apps from clipboard history would be valuable enhancements,” the moderator said. They promised to forward the feedback “to the appropriate team.”

For the time being, their best advice is to delete your clipboard manually and “use secure input methods directly from your password manager.”

Why does it actually matter?

If someone picks up your unlocked phone and checks the clipboard, it’s all there waiting. Or worse, an info-stealing malware is constantly lurking, ready to siphon data straight from your clipboard

Clipboards are a goldmine for hackers. Malicious software like StilachiRAT literally exists to monitor clipboards, hunting for passwords, crypto wallet keys, and any sensitive text it can quietly steal.

Recently, attackers infiltrated European military networks, using the Remote Desktop Protocol to access clipboard data from infected systems.

They weren’t guessing passwords, they were watching people copy and paste them.

If state-sponsored cybercriminals are lurking in your clipboard, maybe it’s time we took it a little more seriously.

Even some apps, like TikTok, have been caught quietly reading clipboard data in the background.

Clipboard tech hasn’t kept up with the sensitivity of what we’re pasting. It’s holding passwords, two-factor codes, crypto addresses, and private URLs – all stored in plain text.

Source: Cybernews

Check Also

Play Ransomware

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an …

Leave a Reply

Your email address will not be published. Required fields are marked *