1/17/2024 0 Comments Lastpass breach 2020This has put LastPass customers’ credentials at substantial risk, protected only by their master password, which thankfully is not stored by the company. They then copied a backup of customer vault data, allowing them to hold this information offline. This in turn enabled the hackers to get hold of credentials and keys that allowed them to access and decrypt storage volumes within the company’s cloud-based storage service. LastPass explained that the source code and technical information taken in August were used to target another employee. The alarm bells were well and truly ringing a couple of days before Christmas when the firm informed users that attackers had accessed both encrypted customer data – username, password and notes – and unencrypted data, such as the website URLs of customers online accounts. He noted that there was no sign that customer data or passwords had been compromised. This new breach was enabled by the information gained by the attacker during the original August incident. The issue escalated at the end of November when LastPass CEO Karim Touba released a notice revealing that an unauthorized party had gained access to a third-party cloud storage device, compromising “certain elements” of its customer information. Unfortunately, things were about to get far uglier. At this point, LastPass said it had found no further evidence of activity from the threat actor, and the unauthorized access was limited to its development system, which is “physically separated” from its production environment. The next update came in September 2022, when LastPass announced it had completed an investigation and forensic review of the breach in conjunction with incident response company Mandiant. However, the company reassured customers that it had “achieved a state of containment” and that there was no evidence that customer data or encrypted password vaults were accessed in the breach. The latest LastPass saga began in late August 2022, when the firm published a post revealing that “an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account.” This compromised account enabled the attacker to take portions of source code and some proprietary LastPass technical information. It is an issue that needs to be placed in the spotlight following the well-publicized LastPass incident. However, if users’ password manager vaults are compromised, it potentially puts every one of their online accounts at risk of compromise. Additionally, these programs alert users if they are duplicating a password across different accounts and notify them if their password has appeared in a known data breach. These solutions are often strongly advised by security experts as a part of best security practices, as they enable users to easily use strong and unique passwords for each online account they possess. Password managers are programs that enable users to store their ever growing list of online credentials in a safe location, removing the need for this information to be recorded in insecure ways, such as sending them via emails and writing on post-it notes. In addition to putting the response and actions of LastPass under the spotlight, the incident has raised questions over the safety of storing multiple login credentials on password managers generally. The multiple breaches of password management giant LastPass in 2022 has created significant discussion – and alarm – among the cybersecurity community, not to mention affected LastPass customers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |