Tuesday, December 3, 2024
HomeCyber Security NewsLastPass Developer Account Hacked to Steal the Company's Source Code

LastPass Developer Account Hacked to Steal the Company’s Source Code

Published on

SIEM as a Service

LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary technical information.

According to the company CEO Karim Toubba, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”

The company says they have seen no evidence of the incident happening. Their investigation is still ongoing and has set up containment and mitigation measures, also engaged leading cybersecurity and forensics firm.

- Advertisement - SIEM as a Service

“There is no evidence that customer data or encrypted password vaults were compromised”, states LastPass Advisory.

According to the FAQs included in the advisory, the attack does not compromise Master Password. They ensure that they follow an industry-standard Zero Knowledge architecture that makes sure LastPass can never know or gain access to our customers’ Master Password.

The company added saying, this incident does not affect the company’s development environment and there is no evidence of any unauthorized access to encrypted vault data.

“Our investigation has shown no evidence of any unauthorized access to customer data in our production environment”, LastPass

LastPass has not included detailed information regarding the attack, how the threat actors compromised the developer account, and what source code was stolen.

The full security advisory emailed to LastPass customers is attached below.

LastPass security advisory emailed to customers

The company ensures that they have executed additional security measures, but have not seen any evidence of the incident.

“While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity”, says LastPass Advisory

Therefore it is essential to enable multi-factor authentication on your LastPass accounts, thus threat actors won’t be able to access your account even if your password is compromised.

Secure Azure AD Conditional Access – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...

ElizaRAT Exploits Google, Telegram, & Slack Services For C2 Communications

APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...