LastPass suffered data theft, including the source code

LastPass suffered data theft, including the source code

LastPass suffered data theft

LastPass, a company known for the password manager of the same name, suffered a security breach that also involved the development environment, with the theft of technical data and even a portion of the software's source code.

The breach allegedly originated from a compromised developer account, as the company stated in a blog post: “Two weeks ago, we detected unusual activity within parts of the LastPass development environment. We have come to the conclusion that an unauthorized person has obtained access to the LastPass development environment through a single compromised developer account and has stolen parts of the source code and some proprietary technical data of LastPass. Our products and services function normally ”.

The company immediately adopted the necessary risk reduction and containment measures, then adopting advanced security measures.

We recently detected unusual activity within portions of the LastPass development environment and have initiated an investigation and deployed containment measures. We have no evidence that this involved any access to customer data. More info: https://t.co/cV8atRsv6d pic.twitter.com/HtPLvK0uEC

- LastPass (@LastPass) August 25, 2022

| ); }
Furthermore, the company found no unauthorized access to customer data, consequently the incident should have no impact on the regular operation of applications and services aimed at users.

That said, if you have a LastPass account and you still want adopt an approach aimed at maximum caution, it may be appropriate to change the Master Password (although the company has confirmed that it does not keep any track of it). Regardless of the specific case, then, another measure that is worth adopting, in general terms, is multi-factor authentication. LastPass also offers passwordless authentication and other security measures.

In general, we recommend that you always enable two-factor authentication, where available.





LastPass Says Source Code Stolen in Data Breach

Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.


The company, which is owned by GoTo (formerly LogMeIn), disclosed the breach in an online notice posted Thursday but insisted that the customer master passwords or any encrypted password vault data were not compromised.


LastPass chief executive Karim Toubba said the company’s security team detected unusual activity within portions of the LastPass development environment two weeks ago and launched an investigation that confirmed the source code theft.


From the LastPass notice:


We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. Our products and services are operating normally.


In response to the incident, we have deployed containment and mitigation measures, and engaged a leading cybersecurity and forensics firm. While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity.  


Toubba said the company is evaluating further mitigation techniques to strengthen its environment. 

[ READ: LastPass Automated Warnings Linked to 'Credential Stuffing' Attack ]


Most importantly, LastPass insists that the incident did not compromise Master Passwords that manage access to encrypted vaults in its flagship password manager software.


“We never store or have knowledge of  your Master Password,” Toubba said, noting that LastPass uses Zero Knowledge architecture that ensures the company can never know or gain access to a customer’s Master Password. 


He said the investigation has shown no evidence of any unauthorized access to encrypted vault data or customer data in the LastPass production environment.  


The latest hack comes on the heels on LastPass users being targeted with “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.


LastPass claims more than 30 million users and 85,000 business customers worldwide. 


Related: LastPass Automated Warnings Linked to 'Credential Stuffing' Attack


Related: Security Flaws in LastPass Exposed User Passwords 


Related: LastPass Flaws Allow Hackers to Steal Passwords

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. Ryan is a veteran cybersecurity strategist who has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and Kaspersky GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan's past career as a security journalist included bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive's ZDNet, PCMag and PC World. Ryan is a director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world. Follow Ryan on Twitter @ryanaraine.Previous Columns by Ryan Naraine: