

- #Lastpass changes march update#
- #Lastpass changes march software#
- #Lastpass changes march code#
- #Lastpass changes march password#
#Lastpass changes march software#
Of 200 software repositories, 14 were compromised.
#Lastpass changes march code#
Cloud-based development and source code repositories.The team took various actions, including analyzing and changing existing privileged access controls, rotating relevant secrets and certificates, and applying additional policies and rules to LastPass cloud-based storage resources.Īs stated above in the incident summaries, the threat actors obtained LastPass proprietary and customer data, which included: Responding to this incident, LastPass mobilized its incident response team. The data accessed in those backups included system configuration data, API secrets, third-party integration secrets, and encrypted and unencrypted customer data. This malware ultimately led to unauthorized access to cloud backups. In Incident B in November 2022, the threat actor targeted a senior DevOps engineer by exploiting a vulnerability in third-party software to deliver malware. In response, LastPass mobilized its internal security teams and external resources and took various actions, including removing the development environment and deploying additional security technologies and controls. However, LastPass learned that the data from this incident was being used to identify targets and initiate the second incident. LastPass investigated this incident and initially declared it closed. No customer information was taken in this incident. The threat actor stole source code, technical information, and certain LastPass internal system secrets from this environment. The threat actor was able to gain access to a cloud-based development environment. A software engineer’s corporate laptop was targeted and compromised in this incident. A review of underground activity reveals no indication that threat actors are actively marketing or selling the information obtained in the incidents. To date, the identity and motivation of the threat actor remain unknown.

There have been no contacts or demands from the threat actors. In response, LastPass shared technical information, Indicators of Compromise (IOCs), and threat-actor tactics, techniques, and procedures (TTPs) with forensic partners and law enforcement. Instead, each incident was caused by a vulnerability in third-party software that allowed the threat actors to bypass existing controls and access non-production development and backup storage environments. These incidents were not caused by defects in LastPass products or unauthorized access to production systems. The two 2022 incidents affected both LastPass and its customers.
#Lastpass changes march password#

Some key points of the LastPass release are: It is important, though, that users follow the advice of vendors and stay aware of changes in security guidance. However, when password managers are used as part of layered security, they can be an effective control. These incidents highlight the fact that no one security measure can be 100% effective.

#Lastpass changes march update#
LastPass’s March 1, 2023 press release provides an update on the 2022 security incidents, the results of their investigations, and recommended remediation actions.
