Soon after that, LastPass VP of Engineering Gabor Angyal stated that they “have no indication that any LastPass accounts were compromised by an unauthorized third party as a result of these credential stuffing attempts, nor have we found any indication that user’s LastPass credentials were harvested by malware, rogue browser extensions, or phishing campaigns.” Internationally sourced data, exfiltrated in Sept and Aug 2021.” In his assessment of the Redline Stealer malware logs, security researcher Bob Diachenko noted, “Redline Stealer malware logs with more than 6M records were exposed online, publicly (now taken down). The previous attack, possibly carried out using the Redline Stealer, resulted in the compromise of the master passwords of some users. See More: Streaming Platform Plex Hit By Data Breach, Alerts Users To Reset Passwords Late in 2021, LastPass was suggestively victimized in a credential stuffing attack, the kind PBKDF2 hashing from the flowchart above is used to thwart. Not even LastPass,” the company notes on its website Opens a new window. “Zero knowledge means that no one has access to your master password or the data stored in your vault, except you. LastPass Zero Knowledge Security Model | Source: LastPass The master passwords weren’t compromised, considering LastPass doesn’t store them and are accessed through the Zero Knowledge security model described in the image below: LastPass’ encrypted vaults store customer passwords that can be decrypted only using the master password. “This doesn’t, however, mean that access to the bank’s floor plan, or even being able to compromise one of the bank employees, necessarily means that any money will be stolen.” Being able to understand how the particular software works can potentially help the malicious actor identify its weak points and ways of gaining entry.” He said, “Bad actors will want source code for the same reason bank robbers will want floor plans to a bank. The company said, “We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”Īvishai Avivi, CISO at SafeBreach, explained to Spiceworks how the theft of the source code could be damaging in the future. While customer data and passwords remain unaffected despite the break-in, LastPass said the hacker could steal the source code and other proprietary data, given the compromised account had access to the LastPass development environment. LastPass explained that the incident occurred a couple of weeks ago when the unknown hacker gained access to its systems through a breached developer account, alerting the password management company of unusual activity. The incident compromised portions of the company’s source code and some proprietary technical information. Password management services provider LastPass suffered the theft of proprietary information after a hacker used a compromised developer account to access the company’s development environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |