![]() Phishing emails may contain “password reset” or “update your password” themes and include references to the LastPass data breach to add credibility. According to Hive Systems’ 2022 Password Table, it would take approximately 34,000 years to crack the master password if users followed the recommended requirements.īased on the unencrypted data that was copied, including customer account information and website URLs, it is more likely impacted organizations will receive targeted phishing emails. Impact of LastPass Data BreachĪlthough brute forcing passwords is a common tactic threat actors leverage, it is extremely unlikely that the threat actor will be successful cracking the master password due to computational limitations, if users followed the recommended password requirements provided by LastPass. If a customer leveraged one of these API integrations, LastPass notified them via email. The compromised keys are used by some business customers who have enabled API-based integrations with LastPass, including SCIM, Enterprise, and SAML API applications. ![]() LastPass also claimed the threat actor had access to a limited number of authentication keys contained in the backups. Encrypted data includes usernames and passwords, secure notes, and form-filled data however, unencrypted data includes website URLs, which are likely the URLs tied to the stored usernames and passwords. The threat actor was able to copy information from the storage volumes, which contained “basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.”įurthermore, the threat actor was able to copy a backup of customer vault data, which contained both unencrypted and encrypted data.Īccording to LastPass, the encrypted data remains secured and can only be decrypted with a unique encryption key derived from a user’s master password. According to their notice, the threat actor used information obtained in an earlier, August 2022, data breach to target an employee and obtain credentials and keys used to decrypt storage volumes within their cloud-based storage service. ![]() On Thursday, December 22, 2022, LastPass updated their security incident notice to include additional details around the data breach they began investigating in November 2022. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |