Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • LastPass attackers steal source code, no evidence users’ passwords compromised
  • Cyber Attacks
  • Data Breach

LastPass attackers steal source code, no evidence users’ passwords compromised

3 years ago Graham Cluley
LastPass attackers steal source code, no evidence users’ passwords compromised

LastPass, the popular password manager used by millions of people around the world, has announced that it suffered a security breach two weeks ago that saw attackers break into its systems and steal information.

But don’t panic just yet – that doesn’t mean that all of your passwords are now in the hands of internet criminals. Although the breach is clearly not good news, the company says that there is no evidence that the attackers were able to access customer data or encrypted password vaults.

In a blog post revealing the security incident, LastPass CEO Karim Toubba announced that two weeks ago the company detected “some unusual activity within portions of the LastPass development environment.”

“We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. Our products and services are operating normally.”


In a brief FAQ the company addresses questions that will probably be foremost in the minds of its approximately 25 million users. Here’s my executive summary.

1. Has my Master password or the Master Password of my users been compromised?

No. LastPass doesn’t store users’ master passwords. If you never store or have knowledge of a piece of data, and can’t access it yourself, then it also can’t be stolen from you.

2. Has any data within my vault or my users’ vaults been compromised?

No. LastPass says that the incident occurred in its development environment, and has seen no evidence of any unauthorised access to encrypted vault data. Again, you can hear the sigh of relief from LastPass users who might have been concerned that their passwords might have fallen into the wrong hands. The benefit of LastPass’s zero-knowledge architecture is that only customers have the access to decrypt password vault data.

3. Has any of my personal information or the personal information of my users been compromised?

No. LastPass says it has seen no evidence of any unauthorised access to customer data in its production environment. It doesn’t explicitly state so, but one hopes that it was not using real customer data in its development environment.

4. What should I do to protect myself and my vault data?

Nothing. For now, LastPass isn’t recommending any courses of action for its users, because it doesn’t feel that there are any steps that users need to take. It does remind users to follow best practices when it comes to setting up and configuring their LastPass account, but that would have made sense even before the security breach occurred.


This isn’t the first time that LastPass has suffered a security breach.

For instance, in 2015 the company advised users to change their LastPass master passwords after account email addresses, password reminders, server per user salts, and authentication hashes were compromised.

And in 2011 I was impressed with how LastPass responded after it discovered attackers had managed to access data on its servers.

In those incidents, LastPass was open and transparent about what had occurred and took steps to reassure its customer base that it took the problems seriously.

If what LastPass is saying about this latest breach is correct – that a single developer’s account was compromised and that users’ data was not put at risk – then that actually could be viewed as some reassurance that the fundamental zero-knowledge architecture of their password management solution works as intended.

Unless we hear otherwise (and it would be good in due course to hear more about the developer’s account was compromised, and what LastPass is doing to ensure that doesn’t happen again), then it does not sound as if there is any need for users to panic.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” LastPass attackers steal source code, no evidence users’ passwords compromised” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: TripWire

Continue Reading

Previous Hackers Breach LastPass Developer System to Steal Source Code
Next Ransomware Attacks are on the Rise

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

5 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

10 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

13 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT