LastPass was hacked twice last year by the same actor; one incident was reported in late August 2022 and the other on November 30, 2022. The global password manager company released a report on Wednesday with new findings from its security incident investigation, along with recommended actions for users and businesses affected.
Jump to:
As reported by LastPass, the hacker initially breached a software engineer’s corporate laptop in August. The first attack was critical, as the hacker was able to leverage information the threat actor stole during the initial security incident. Exploiting a third-party media software package vulnerability, the bad actor then launched the second coordinated attack. The second attack targeted a DevOps engineer’s home computer.
“The threat actor was able to capture the employee’s master password as it was entered after the employee authenticated with MFA and gained access to the DevOps engineer’s LastPass corporate vault,” detailed the company´s recent security incident report.
LastPass has confirmed that during the second incident, the attacker accessed the company´s data vault, cloud-based backup storage — containing configuration data, API secrets, third-party integration secrets, customer metadata — and all customer vault data backups. The LastPass vault also includes access to the shared cloud-storage environment that contains the encryption keys for customer vault backups stored in Amazon S3 buckets where users store data in their Amazon Web Services cloud environment.
The second attack was highly focused and well-researched, as it targeted one of only four LastPass employees who have access to the corporate vault. After the hacker had the decrypted vault, the cybercriminal exported the entries, including the decryption keys needed to access the AWS S3 LastPass production backups, other cloud-based storage resources and related critical database backups.
LastPass issued recommendations for affected users and businesses in two security bulletins. Here are the key details from those bulletins.
The Security Bulletin: Recommended actions for LastPass free, premium, and families includes best practices primarily centered on master passwords, guides to creating strong passwords and enabling extra layers of security such as multifactor authentication. The company also urged users to reset their passwords.
LastPass master passwords should be ideally 16 to 20 characters long, contain at least one upper case, lower case, numeric, symbols, and special characters, and be unique — that is, not used on another site. To reset LastPass master passwords, users can follow the official LastPass guide.
LastPass also asked users to use the Security Dashboard to check the security score of their current password strength, to turn on and check the dark web monitoring feature, and to enable default MFA. Dark web monitoring alerts users when their email addresses appear in dark web forums and sites.
The Security Bulletin: Recommended Actions for LastPass Business Administrators was prepared exclusively after the event to help businesses that use LastPass. The more comprehensive guide includes 10 points:
Super admin LastPass users have additional privileges that go beyond the average administrator. Given their extensive powers, the company issued special recommendations for super admin users after the attacks. LastPass super admin recommendations include the following.
LastPass has expressed confidence that it has taken the necessary actions to contain and eradicate future access to the service; however, according to Wired, the last disclosure of LastPass was so concerning that security professionals rapidly “started calling for users to switch to other services.” Top competitors to LastPass include 1Password and Dashlane.
SEE: Bitwarden vs 1Password | Keeper vs LastPass (TechRepublic)
Experts have also questioned the transparency of LastPass, which fails to date security incident statements and has still not set the record straight on exactly when the second attack happened, nor how much time the hacker was inside the system; the time a hacker has inside a system significantly impacts the amount of data and systems that can be exploited. (I contacted LastPass for a comment, but I did not receive a reply by the time of publication.)
For LastPass users, the consequences of these recent security incidents are evident. While the company assures that there is no indication that the data compromised is being sold or marketed on the dark web, business administrators are left to deal with the extensive recommendations issued by LastPass.
Unfortunately, the trend of hacking password managers is not new. LastPass has experienced security incidents every year since 2016, and other top password managers like Norton LifeLock, Passwordstate, Dashlane, Keeper, 1Password and RoboForm have been either targeted, breached or proved to be vulnerable, as reported by Best Reviews.
Cybercriminals are increasingly targeting password manager companies because they hold the sensitive data that can be used to access millions of accounts, including cloud accounts where business-critical systems and digital assets are hosted. In this highly competitive landscape, cybersecurity practices, transparency, breaches and data exfiltration can influence the future of these password manager companies.
Despite the fact that the password manager market is expected to reach $7.09 billion by 2028, according to SkyQuest reports, it’s not a surprise that a passwordless future continues to gain momentum, driven by Apple, Microsoft, and Google under the FIDO alliance. Read TechRepublic’s recent interview with 1Password about its plans for a password-free future.
24World Media does not take any responsibility of the information you see on this page. The content this page contains is from independent third-party content provider. If you have any concerns regarding the content, please free to write us here: contact@24worldmedia.com