GoTo, the parent company of LastPass, in January confirmed a threat actor exfiltrated encrypted backups and an encryption key from the same storage vault that it shares with LastPass. The intrusion allowed the threat actor to exfiltrate corporate vault entries and shared folders, which contained encrypted notes with access and decryption keys needed to access the company’s AWS production backups, resources and some critical database backups, the company said.įour months after the initial breach, as 2022 came to a close, LastPass said customer data, including encrypted passwords, usernames and form-filled data was significantly compromised by the attack. “The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault.” The breach was notified by LastPass on 25 August, prior to the bank holiday weekend, but was first detected a fortnight earlier, said CEO Karim Toubba, when it spotted some unusual activity. As LastPass was compromised, so was GoTo. Is the recommendation for them to switch again, to. LastPass is an independent company, owned by GoTo (an SaaS provider, formerly known as LogMeIn), and while the LastPass breach has garnered the most attention, the initial penetration was of a third-party cloud storage service, which is used by both GoTo and LastPass. “The threat actor targeted one of the four DevOps engineers who had access to the decryption keys needed to access the cloud storage service,” LastPass said. Lots of people have, from comments I've seen on social media, already switched to Bitwarden following the recent LastPass breach disclosures.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |