/

What happened in the LastPass data breach?

What happened in the LastPass data breach?

Twingate Team

May 24, 2024

In December 2022, LastPass, a popular password manager, experienced a data breach involving unauthorized access to a third-party cloud storage service. Additionally, a backup of customer vault data was copied, but sensitive vault data, including website usernames and passwords, secure notes, and form-filled data, remained encrypted and secured with 256-bit AES encryption, only accessible with a unique encryption key derived from each user's master password.

How many accounts were compromised?

The breach impacted data related to approximately 33 million individuals.

What data was leaked?

The data exposed in the breach included company names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses.

How was LastPass hacked?

In the LastPass data breach, the threat actor exploited a vulnerability in third-party software and delivered malware to a senior DevOps engineer's system. This allowed them to bypass existing controls and gain unauthorized access to non-production development and backup storage environments. The breach was discovered during an exhaustive investigation conducted by LastPass and its security partners, leading to containment, eradication, and recovery actions in response to the incidents.

LastPass's solution

In response to the data breach, LastPass took several measures to enhance its security and prevent future hacking incidents. These actions included deploying containment and mitigation measures, engaging a leading cybersecurity and forensics firm, and implementing additional endpoint security controls and monitoring. LastPass also decommissioned the compromised development environment, rebuilt a new one from scratch, and replaced and further hardened developer machines, processes, and authentication mechanisms. The company notified affected customers and encouraged them to change their passwords as a precaution.

How do I know if I was affected?

LastPass notified customers believed to be affected by the breach. If you're a LastPass user and haven't received a notification, you may visit Have I Been Pwned to check your credentials.

What should affected users do?

In general, affected users should:

  1. Change Your Password: Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.

  2. Reset Passwords for Other Accounts: If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.

  3. Enable Two-Factor Authentication (2FA): Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.

For more specific help and instructions related to LastPass's data breach, please contact LastPass support directly.

Where can I go to learn more?

If you want to find more information on the LastPass data breach, check out the following news articles:

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

What happened in the LastPass data breach?

What happened in the LastPass data breach?

Twingate Team

May 24, 2024

In December 2022, LastPass, a popular password manager, experienced a data breach involving unauthorized access to a third-party cloud storage service. Additionally, a backup of customer vault data was copied, but sensitive vault data, including website usernames and passwords, secure notes, and form-filled data, remained encrypted and secured with 256-bit AES encryption, only accessible with a unique encryption key derived from each user's master password.

How many accounts were compromised?

The breach impacted data related to approximately 33 million individuals.

What data was leaked?

The data exposed in the breach included company names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses.

How was LastPass hacked?

In the LastPass data breach, the threat actor exploited a vulnerability in third-party software and delivered malware to a senior DevOps engineer's system. This allowed them to bypass existing controls and gain unauthorized access to non-production development and backup storage environments. The breach was discovered during an exhaustive investigation conducted by LastPass and its security partners, leading to containment, eradication, and recovery actions in response to the incidents.

LastPass's solution

In response to the data breach, LastPass took several measures to enhance its security and prevent future hacking incidents. These actions included deploying containment and mitigation measures, engaging a leading cybersecurity and forensics firm, and implementing additional endpoint security controls and monitoring. LastPass also decommissioned the compromised development environment, rebuilt a new one from scratch, and replaced and further hardened developer machines, processes, and authentication mechanisms. The company notified affected customers and encouraged them to change their passwords as a precaution.

How do I know if I was affected?

LastPass notified customers believed to be affected by the breach. If you're a LastPass user and haven't received a notification, you may visit Have I Been Pwned to check your credentials.

What should affected users do?

In general, affected users should:

  1. Change Your Password: Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.

  2. Reset Passwords for Other Accounts: If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.

  3. Enable Two-Factor Authentication (2FA): Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.

For more specific help and instructions related to LastPass's data breach, please contact LastPass support directly.

Where can I go to learn more?

If you want to find more information on the LastPass data breach, check out the following news articles:

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

What happened in the LastPass data breach?

Twingate Team

May 24, 2024

In December 2022, LastPass, a popular password manager, experienced a data breach involving unauthorized access to a third-party cloud storage service. Additionally, a backup of customer vault data was copied, but sensitive vault data, including website usernames and passwords, secure notes, and form-filled data, remained encrypted and secured with 256-bit AES encryption, only accessible with a unique encryption key derived from each user's master password.

How many accounts were compromised?

The breach impacted data related to approximately 33 million individuals.

What data was leaked?

The data exposed in the breach included company names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses.

How was LastPass hacked?

In the LastPass data breach, the threat actor exploited a vulnerability in third-party software and delivered malware to a senior DevOps engineer's system. This allowed them to bypass existing controls and gain unauthorized access to non-production development and backup storage environments. The breach was discovered during an exhaustive investigation conducted by LastPass and its security partners, leading to containment, eradication, and recovery actions in response to the incidents.

LastPass's solution

In response to the data breach, LastPass took several measures to enhance its security and prevent future hacking incidents. These actions included deploying containment and mitigation measures, engaging a leading cybersecurity and forensics firm, and implementing additional endpoint security controls and monitoring. LastPass also decommissioned the compromised development environment, rebuilt a new one from scratch, and replaced and further hardened developer machines, processes, and authentication mechanisms. The company notified affected customers and encouraged them to change their passwords as a precaution.

How do I know if I was affected?

LastPass notified customers believed to be affected by the breach. If you're a LastPass user and haven't received a notification, you may visit Have I Been Pwned to check your credentials.

What should affected users do?

In general, affected users should:

  1. Change Your Password: Immediately update your password for the breached account. Make sure the new password is strong and unique, not previously used on any other platform.

  2. Reset Passwords for Other Accounts: If you've used the same or similar passwords for other online accounts, reset those as well. This is crucial as attackers often try using stolen passwords on multiple sites.

  3. Enable Two-Factor Authentication (2FA): Activate 2FA on the breached account. Consider enabling this additional security feature on all other important online accounts to significantly reduce the risk of unauthorized access.

For more specific help and instructions related to LastPass's data breach, please contact LastPass support directly.

Where can I go to learn more?

If you want to find more information on the LastPass data breach, check out the following news articles: