LastPass recently disclosed a new system breach that has paved the way for hackers to access customer data.
LastPass, a password management software, now admits that they already found evidence of the alleged data breach in August.
Previously they told the public that there was no evidence found as proof that their system had been compromised more than three months ago.
LastPass CEO Karim Toubba revealed the initial data breach in late August, saying that only one developer account had been hacked. Despite the theft of source code and certain confidential LastPass technical information, Toubba claims its investigation with incident response firm Mandiant found no evidence that customer data was compromised.
On Wednesday, an updated statement was released stating that there are still remnants and aftershocks from the attack. The said fallout may continue to disturb customers.
Toubba explained in the update: “We have determined that an unauthorised party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information. We are working diligently to understand the scope of the incident and identify what specific information has been accessed.”
After noticing odd behaviour within a third-party cloud storage service shared by GoTo, formerly known as LogMeIn, which purchased LastPass in 2015, LastPass said it retained the services of Mandiant again and alerted law authorities.
LastPass wrote about the initial investigation in September: “Although the threat actor was able to access the development environment, our system design and controls prevented the threat actor from accessing any customer data or encrypted password vaults.”
Lastpass wants to give customers confidence by deploying endpoint security controls and implementing strengthened monitoring. No necessary actions were recommended for customers to take as of now.
While LastPass maintains that its services are still available and its clients’ passwords remain secure, it is unclear whether this applies to all or just master passwords. It is also uncertain what, if any, consumer information the threat actor obtained in the most recent intrusion.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...