Saturday, December 2, 2023

LastPass Developer Account Hacked to Steal the Company’s Source Code

LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary technical information.

According to the company CEO Karim Toubba, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”

The company says they have seen no evidence of the incident happening. Their investigation is still ongoing and has set up containment and mitigation measures, also engaged leading cybersecurity and forensics firm.

“There is no evidence that customer data or encrypted password vaults were compromised”, states LastPass Advisory.

According to the FAQs included in the advisory, the attack does not compromise Master Password. They ensure that they follow an industry-standard Zero Knowledge architecture that makes sure LastPass can never know or gain access to our customers’ Master Password.

The company added saying, this incident does not affect the company’s development environment and there is no evidence of any unauthorized access to encrypted vault data.

“Our investigation has shown no evidence of any unauthorized access to customer data in our production environment”, LastPass

LastPass has not included detailed information regarding the attack, how the threat actors compromised the developer account, and what source code was stolen.

The full security advisory emailed to LastPass customers is attached below.

LastPass security advisory emailed to customers

The company ensures that they have executed additional security measures, but have not seen any evidence of the incident.

“While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity”, says LastPass Advisory

Therefore it is essential to enable multi-factor authentication on your LastPass accounts, thus threat actors won’t be able to access your account even if your password is compromised.

Secure Azure AD Conditional Access – Download Free E-Book


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles