LastPass Developer Account Hacked to Steal the Company’s Source Code

LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary technical information.

According to the company CEO Karim Toubba, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”

The company says they have seen no evidence of the incident happening. Their investigation is still ongoing and has set up containment and mitigation measures, also engaged leading cybersecurity and forensics firm.

“There is no evidence that customer data or encrypted password vaults were compromised”, states LastPass Advisory.

According to the FAQs included in the advisory, the attack does not compromise Master Password. They ensure that they follow an industry-standard Zero Knowledge architecture that makes sure LastPass can never know or gain access to our customers’ Master Password.

The company added saying, this incident does not affect the company’s development environment and there is no evidence of any unauthorized access to encrypted vault data.

“Our investigation has shown no evidence of any unauthorized access to customer data in our production environment”, LastPass

LastPass has not included detailed information regarding the attack, how the threat actors compromised the developer account, and what source code was stolen.

The full security advisory emailed to LastPass customers is attached below.

LastPass security advisory emailed to customers

The company ensures that they have executed additional security measures, but have not seen any evidence of the incident.

“While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity”, says LastPass Advisory

Therefore it is essential to enable multi-factor authentication on your LastPass accounts, thus threat actors won’t be able to access your account even if your password is compromised.

Secure Azure AD Conditional Access – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

2 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

2 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

5 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

8 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

9 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

9 hours ago