Already smarting from a breach that put partially encrypted login data into a threat actor’s hands, LastPass on Monday said that the same attacker hacked an employee’s home computer and obtained a decrypted vault available to only a handful of company developers.

Although an initial intrusion into LastPass ended on August 12, officials with the leading password manager said the threat actor “was actively engaged in a new series of reconnaissance, enumeration, and exfiltration activity” from August 12 to August 26. In the process, the unknown threat actor was able to steal valid credentials from a senior DevOps engineer and access the contents of a LastPass data vault. Among other things, the vault gave access to a shared cloud-storage environment that contained the encryption keys for customer vault backups stored in Amazon S3 buckets.

Another bombshell drops

“This was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled remote code execution capability and allowed the threat actor to implant keylogger malware,” LastPass officials wrote. “The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault.”

https://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/

1 year ago

Comment has been collapsed.

Have you stopped relying on LastPass since the August 2022 and December 2022 breaches?

View Results
I am still using LastPass.
I have changed to another password vault brand.
I have never used a password vault or not intend to in the future.

This is why 2FA is important.

1 year ago
Permalink

Comment has been collapsed.

It didn't work for the DevOps engineer, MFA is Multi-Factor Authentication (2 or more factors).

1 year ago
Permalink

Comment has been collapsed.

The vote is missing the option "I used a different password vault from the beginning" 😋

1 year ago
Permalink

Comment has been collapsed.

Yup. I was looking for that option too :(

1 year ago
Permalink

Comment has been collapsed.

+1
KeePassXC that is. :)

1 year ago
Permalink

Comment has been collapsed.

Yup.

1 year ago
Permalink

Comment has been collapsed.

I store my passwords locally in a KeePassXC database stored in my own drives.
I don't trust cloud password managers because they're a big target for hackers and the leaks are just a matter of time.

1 year ago
Permalink

Comment has been collapsed.

Except this whole article is someone hacking a user's computer, not about cloud-based data.
If your database is connected to a computer that's online, then it's no more secure than what just happened in this situation.

1 year ago
Permalink

Comment has been collapsed.

Although it's true but probability that a computer of an average Joe gets hacked is lesser than hacking of a cloud provider.

1 year ago
Permalink

Comment has been collapsed.

Well... We're crossing topics. I'm replying to the poll, not to the article.
Sorry for the confusion.

1 year ago
Permalink

Comment has been collapsed.

“This was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled remote code execution capability and allowed the threat actor to implant keylogger malware,”

I like how they try so very hard to say "look, it's not our fault" when really it is because I don't care how many is "a handful of company developers", how the hell does a guy working in what is essentially a security company get a keylogger on his computer and has no idea?

1 year ago*
Permalink

Comment has been collapsed.

Like that is the only problem with this sentence.. They literally had 1 job........... It's like being a cook and serving mud xD

1 year ago
Permalink

Comment has been collapsed.

Agreed.
They can lock these things tight and encrypt them to hell and back. The problem is always going to come from the human element.
Until they are run by machines from top to bottom, these vaults will never be as "secure" as they advertise them to be.

1 year ago
Permalink

Comment has been collapsed.

It is safer to keep your passwords in a plain .txt file on your desktop at this point. No encryption, just plain passwords.

1 year ago
Permalink

Comment has been collapsed.

In which way is it safer?

1 year ago
Permalink

Comment has been collapsed.

Should've added the /j at the end to indicate it's a joke.

1 year ago
Permalink

Comment has been collapsed.

I wasn't sure and decided to ask... Some people have strange ideas.

1 year ago
Permalink

Comment has been collapsed.

I always thought Passwords vaults are stupid and pointless. You get all of your passwords and accounts and put them under one account. How is that better or safer in any way whatsoever? Just use 2FA, and if you really can't remember your passwords and don't trust having them on a local file or cloud file, get a notebook. No one will hack your paper notebook.

1 year ago
Permalink

Comment has been collapsed.

They are actually not pointless and even useful since so many people use a password vault without noticing (a.k.a Google Chrome) and that's already a bad situation, trusting a big corporation that has so many info about you, imagine a leak there. Anyway, there are offline password vaults and the databases can be synced between local devices with something like Syncthing. Of course keeping a paper notebook is the best but using an offline vault is more practical.

1 year ago
Permalink

Comment has been collapsed.

The vaults help to have different and complex passwords for every of zillions accounts. 2FA and vaults don't contradict but complement each other. And a paper notebook is much easier to lose and compromise.

1 year ago
Permalink

Comment has been collapsed.

You've never lost your phone and lost access to 2FA then :-P

1 year ago
Permalink

Comment has been collapsed.

Sign in through Steam to add a comment.