In his latest update about the incident, LastPass CEO Karim Toubba said that the company's investigation with cybersecurity firm Mandiant has revealed that the bad actor had internal access to its systems for four days. Any news about a password manager getting hacked can be alarming, but the company is now reassuring its users that their logins and other information weren't compromised in the event. Catalin Cimpanu summarized the whole thing in the following tweet.In August, LastPass had admitted that an "unauthorized party" gained entry into its system. No passwords were tapped and the master password is not in danger either. For users of the service, the whole thing seems to have gone off without a hitch so far. Currently, the powers that be at LastPass see no further evidence of unauthorized activity.īased on the lessons learned and the measures implemented, the folks at LastPass are looking into further protective measures. Additionally, improved security measures have been implemented. While that investigation is ongoing, security specialists at LastPass have reached a state of containment (of the attack) – or so they hope. In response, an investigation was immediately launched, containment and mitigation measures were put in place, and a leading cybersecurity and forensics firm was hired. LastPass products and services are functioning normally, they say. LastPass developers write that they have no evidence that this incident involved any access to customer data or encrypted password vaults. Upon looking it up, an unauthorized party was found to have gained access to parts of the LastPass development environment through a single compromised developer account and stolen parts of the source code and some proprietary technical information from LastPass. In a nutshell, LastPass has recently detected unusual activity in parts of the LastPass development environment. We thank you for your patience as we work expeditiously to complete our investigation and regret any concerns this may have caused you. We have set up a blog post dedicated to providing more information on this incident. We will continue to update our customers with the transparency they deserve. While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity.īased on what we have learned and implemented, we are evaluating further mitigation techniques to strengthen our environment. In response, we immediately initiated an investigation, deployed containment and mitigation measures, and engaged a leading cybersecurity and forensics firm. Our products and services are operating normally. We have no evidence that this incident involved any access to customer data or encrypted password vaults. We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. We are writing to inform you that we recently detected some unusual activity within portions of the LastPass development environment. Blog reader Phil provided me with the text of the notification LastPass sends to affected parties. I have been alerted to the LastPass security incident via both Twitter and Facebook by blog readers via personal messages (thanks for that).
0 Comments
Leave a Reply. |