LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary technical information.
According to the company CEO Karim Toubba, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”
The company says they have seen no evidence of the incident happening. Their investigation is still ongoing and has set up containment and mitigation measures, also engaged leading cybersecurity and forensics firm.
“There is no evidence that customer data or encrypted password vaults were compromised”, states LastPass Advisory.
According to the FAQs included in the advisory, the attack does not compromise Master Password. They ensure that they follow an industry-standard Zero Knowledge architecture that makes sure LastPass can never know or gain access to our customers’ Master Password.
The company added saying, this incident does not affect the company’s development environment and there is no evidence of any unauthorized access to encrypted vault data.
“Our investigation has shown no evidence of any unauthorized access to customer data in our production environment”, LastPass
LastPass has not included detailed information regarding the attack, how the threat actors compromised the developer account, and what source code was stolen.
The full security advisory emailed to LastPass customers is attached below.
The company ensures that they have executed additional security measures, but have not seen any evidence of the incident.
“While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity”, says LastPass Advisory
Therefore it is essential to enable multi-factor authentication on your LastPass accounts, thus threat actors won’t be able to access your account even if your password is compromised.
Secure Azure AD Conditional Access – Download Free E-Book
The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and…
Julius “Zeekill” Kivimäki, once Europe's most wanted teenage hacker, has been arrested. Kivimäki, known for his involvement with the notorious Lizard Squad, was apprehended after a series of…
A security flaw has been identified in Tinyproxy, a lightweight HTTP/HTTPS proxy daemon widely used in small network environments. The…
Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789. These vulnerabilities were associated with Command Injection on Linksys routers.…
Vincent Cannady, a professional who used to work as a consultant in the cybersecurity field, has been taken into custody…
Infected websites mimic legitimate human verification prompts (CAPTCHAs) to trick users, who often request seemingly innocuous clicks, resembling past CAPTCHA…