LastPass publishes more details on December 2022 breach

 

LastPass has published more details regarding its December 2022 breach, saying that hackers gained access to its systems by infecting an engineer's computer with a keylogger. 

Hackers stole a decryption key from the engineer.

  • Only four DevOps engineers had access to LastPasss' Amazon S3 buckets credentials.
  • Hackers targeted all of them, successfully managing to breach one using a remote code execution vulnerability.
  • Since the first breach attempt on Aug. 12, 2022, the threat actor has conducted information theft and operations activities that didn't stop until Oct. 26, 2022.
  • Using the information they stole during the first and second waves of cyberattacks, the threat actor concluded the operation in December.
  • Some of the information that hackers managed to steal from the multiple cyberattacks is:
    • 14 of the total 200 software repositories,
    • Internal scripts from the repositories,
    • Technical information that described how the development environment operated,
    • Summary of data accessed in Incident 2,
    • DevOps Secrets,
    • Contained configuration data,
    • API secrets,
    • third-party integration secrets,
    • customer metadata,
    • backups of all customer vault data.
    • Backup of LastPass MFA/Federation Database, contained copies of LastPass Authenticator seeds,
    • telephone numbers used for the MFA backup option, etc.

Post a Comment

Previous Next

Contact Form