I'm sure this is ancient news to some, but I just stumbled upon this information today. 
Malware that target FileZilla must be having a field day.
I am not affected as I try and avoid letting programs save my passwords.
In the case of FileZilla, I've always used:
	
	
	
		
and
	
	
	
		
The passwords are stored in \Users\YourUserName\AppData\Roaming\FileZilla\sitemanager.xml
Below is an entry for a ficticious site that I created. The password is omgitstrue :
	
	
	
		
	
		
			
		
		
	
				
			
Malware that target FileZilla must be having a field day.

I am not affected as I try and avoid letting programs save my passwords.
In the case of FileZilla, I've always used:
		Code:
	
	Logon Type: Interactive
		Code:
	
	Protocol: SFTP - SSH File Transfer ProtocolThe passwords are stored in \Users\YourUserName\AppData\Roaming\FileZilla\sitemanager.xml
Below is an entry for a ficticious site that I created. The password is omgitstrue :
		Code:
	
	        <Server>
            <Host>127.0.0.1</Host>
            <Port>2222</Port>
            <Protocol>1</Protocol>
            <Type>0</Type>
            <User>ftp</User>
            <Pass>omgitstrue</Pass>
            <Logontype>1</Logontype>
            <TimezoneOffset>0</TimezoneOffset>
            <PasvMode>MODE_DEFAULT</PasvMode>
            <MaximumMultipleConnections>0</MaximumMultipleConnections>
            <EncodingType>Auto</EncodingType>
            <BypassProxy>0</BypassProxy>
            <Name>SMH</Name>
            <Comments></Comments>
            <LocalDir></LocalDir>
            <RemoteDir></RemoteDir>
            <SyncBrowsing>0</SyncBrowsing>omg
        </Server> 
	 
  
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		 
 
		
