Wednesday, December 18, 2024
HomeCyber AttackLastPass Hacked - Attackers Breached Cloud Storage & Access Customer Data

LastPass Hacked – Attackers Breached Cloud Storage & Access Customer Data

Published on

SIEM as a Service

Using data from the August 2022 incident, LastPass experienced a breach of user information within a third-party cloud storage service.

LastPass is a freemium Android password manager that simply collects encrypted passwords online, and LogMeIn, Inc. obtained the LastPass in October 2015.

“We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo,” the company said.

- Advertisement - SIEM as a Service

“We have determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information.”

The breach is the subject of an ongoing investigation conducted by Mandiant, according to LastPass CEO Karim Toubba, who also stated that law enforcement had been informed.

Additionally, the company stated that customer passwords “remain safely encrypted due to LastPass’s Zero Knowledge architecture” and have not been compromised.

August 2022 Saw a Breach of the Organization’s Developer Environment

In the August incident, a developer account that had been hijacked by hackers had allowed them access to the company’s developer environment.

At the time, the company stated that no customer information or passwords had been exposed and that the attacker had only accessed “source code and some proprietary LastPass technical information” as a result of the incident.

The company then disclosed that the attackers of the security breach in August had internal access to its systems for four days before being ejected.

It’s unclear in this instance what exact consumer information was disclosed.

“We are working diligently to understand the scope of the incident and identify what specific information has been accessed”, according to LastPass’s recent notice of a security incident.

“We can confirm that LastPass products and services remain fully functional”. 

Company’s Response to the Incident

The company promised to implement improved security controls and monitoring tools to stop further threat activity.

“As part of our efforts, we continue to deploy enhanced security measures and monitoring capabilities across our infrastructure to help detect and prevent further threat actor activity”, LastPass.

Penetration Testing As a Service – Download Red Team & Blue Team Workspace

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary...

Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code

Cybercriminals exploited typosquatting to deploy a malicious npm package, `@typescript_eslinter/eslint`, targeting developers seeking the...

Hackers Target Android Users via WhatsApp to Steal Sensitive Data

Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in...