Wednesday, April 2, 2025
HomeCyber Security NewsLastPass Developer Account Hacked to Steal the Company's Source Code

LastPass Developer Account Hacked to Steal the Company’s Source Code

Published on

SIEM as a Service

Follow Us on Google News

LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary technical information.

According to the company CEO Karim Toubba, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”

The company says they have seen no evidence of the incident happening. Their investigation is still ongoing and has set up containment and mitigation measures, also engaged leading cybersecurity and forensics firm.

“There is no evidence that customer data or encrypted password vaults were compromised”, states LastPass Advisory.

According to the FAQs included in the advisory, the attack does not compromise Master Password. They ensure that they follow an industry-standard Zero Knowledge architecture that makes sure LastPass can never know or gain access to our customers’ Master Password.

The company added saying, this incident does not affect the company’s development environment and there is no evidence of any unauthorized access to encrypted vault data.

“Our investigation has shown no evidence of any unauthorized access to customer data in our production environment”, LastPass

LastPass has not included detailed information regarding the attack, how the threat actors compromised the developer account, and what source code was stolen.

The full security advisory emailed to LastPass customers is attached below.

LastPass security advisory emailed to customers

The company ensures that they have executed additional security measures, but have not seen any evidence of the incident.

“While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity”, says LastPass Advisory

Therefore it is essential to enable multi-factor authentication on your LastPass accounts, thus threat actors won’t be able to access your account even if your password is compromised.

Secure Azure AD Conditional Access – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection

The Sliver Command & Control (C2) framework, an open-source tool written in Go, has...

Ransomware Threatens 93% of Industries— Resilience Is Critical

Ransomware continues to be one of the most disruptive cyber threats, with recent data...

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit...

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads

Cybersecurity experts at eSentire's Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection

The Sliver Command & Control (C2) framework, an open-source tool written in Go, has...

Ransomware Threatens 93% of Industries— Resilience Is Critical

Ransomware continues to be one of the most disruptive cyber threats, with recent data...

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit...