September 21, 2023

LastPass suffered a series of attacks where the threat actor used data and combined the information available from a third-party data breach. Then the attackers exploited a flaw in a third-party media software package to target the firm.

Now LastPass came up with a detailed investigation report about the attack.

As per the report “the investigation has revealed that the threat actor pivoted from the first incident, which ended on August 12, 2022, but was actively engaged in a new series of reconnaissance, enumeration, and exfiltration activities aligned to the cloud storage environment spanning from August 12, 2022, to October 26, 2022.

The second incident saw the threat actor quickly make use of information exfiltrated during the first incident, prior to the reset completed by our teams, to enumerate and ultimately exfiltrate data from the cloud storage resources.

Advertisements

The investigation conducted by LastPass with the help of the cybersecurity firm Mandiant confirmed the attack on the DevOps engineer’s home computer.

The attackers targeted one of the four DevOps engineers who had access to the decryption keys needed to access the cloud storage service. The hackers installed a keylogger on the DevOps engineer’s system and  got their hands on his master password after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault

The cloud storage service accessed by the threat actor is physically separate from the production environment. 

The attacker then exported the native corporate vault entries and content of shared folders, which contained encrypted secure notes with access and decryption keys needed to access the AWS S3 LastPass production backups, other cloud-based storage resources, and some related critical database backups stored in a proprietary format. Those backups include company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.

In August 2022, the company disclosed the first security breach, and then in December 2022, LastPass revealed that the data breach suffered in August 2022 is more severe than previously thought.

Advertisements

The attackers used the info accessed to target another employee and obtain credentials and keys which were used to access and decrypt some storage volumes within the cloud-based storage service.

This report comes as a wake-up call, about how a remote worker is been targeted for stealing sensitive data that are the intellectual property of the organization. Since their existed a little segmentation with production data, LastPass escaped from a more severe breach.

Leave a Reply

%d bloggers like this: