LastPass Reports Another Security Breach, Perps Leveraged Info Stolen Previously

LastPass has posted a notice that it has experienced another data breach – with the perpetrators apparently utilizing information stolen before. LastPass is best known for its GoTo products enabling virtual operating environments.

LastPass stated:

“We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo. We immediately launched an investigation, engaged Mandiant, a leading security firm, and alerted law enforcement. 

We have determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information. Our customers’ passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture.”

In September, LastPass updated users on the breach, which took place in August of 2022, reporting:

“We have completed the investigation and forensics process in partnership with Mandiant. Our investigation revealed that the threat actor’s activity was limited to a four-day period in August 2022. During this timeframe, the LastPass security team detected the threat actor’s activity and then contained the incident.  There is no evidence of any threat actor activity beyond the established timeline. We can also confirm that there is no evidence that this incident involved any access to customer data or encrypted password vaults.    

Our investigation determined that the threat actor gained access to the Development environment using a developer’s compromised endpoint. While the method used for the initial endpoint compromise is inconclusive, the threat actor utilized their persistent access to impersonate the developer once the developer had successfully authenticated using multi-factor authentication.  

Although the threat actor was able to access the Development environment, our system design and controls prevented the threat actor from accessing any customer data or encrypted password vaults.”

At the time of the above statement, Last Pass noted that it had conducted an analysis of its source code to “validate code integrity.”

Yoav Iellin, Senior Researcher at Silverfort – a cyber security firm, commented on the newest hack of Last Pass:

“Given the vast amount of passwords it protects globally, Lastpass remains a big target. The company has admitted the threat actor gained access using information obtained in the previous compromise. Exactly what this information is remains unclear but, typically, It’s best practice after suffering a breach for the organization to generate new access keys and replace other compromised credentials. This ensures things like cloud storage and backup access keys cannot be reused. For worried users, ensure you watch out for updates from the company and take time to verify these are legitimate before taking any action. In addition, ensuring you have two-factor authentication on any applications with passwords in LastPass and changing passwords will provide the utmost level of security. “

While LastPass states data access has been limited, the repeated hacks indicate shortfalls in cyber protocols and overall platform security.



Sponsored Links by DQ Promote