Last August, the cybersecurity community was shocked when the news that one of the password security experts reported that they were hacked. They were infiltrated through a single compromised developer environment. The company assured their clients no data was hacked, but recently they have made a shocking update.
At the time, LastPass CEO Karim Toubba reported that “an unauthorised party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.”
The CEO assured its users that they had nothing to worry about because the company did not see evidence that any sensitive information was taken, just some source code.
However, last November, the company updated its statement that it had detected some unusual activity within a third-party cloud storage service.
Toubba, in a separate blog, published that hackers responsible for the breach last August gained access to other credentials and keys “which were used to access and decrypt some storage volumes within the cloud-based storage service.”
The August attack led to the November attack. According to the public release of LastPass, “The threat actor copied information from the backup that contained basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.”
According to the company, the attacker may attempt to use brute force to guess the user’s master password using the data hacked last August. But LastPass reassures its clients that as long as they have followed the recommendations provided by the company, such as creating a strong master password and not using it in multiple accounts, they should not worry about the brute-forcing attempts of the threat actors.
However, cybersecurity experts still recommend that users change their passwords and not simply ‘rotate’ credentials or passwords. People usually rotate or make minimal changes but keep a general password, which may be easier for threat actors to guess once they get a hold of old passwords.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...