LastPass has published more details regarding its December 2022 breach, saying that hackers gained access to its systems by infecting an engineer's computer with a keylogger. 
Hackers stole a decryption key from the engineer.
- Only four DevOps engineers had access to LastPasss' Amazon S3 buckets credentials.
 - Hackers targeted all of them, successfully managing to breach one using a remote code execution vulnerability.
 - Since the first breach attempt on Aug. 12, 2022, the threat actor has conducted information theft and operations activities that didn't stop until Oct. 26, 2022.
 - Using the information they stole during the first and second waves of cyberattacks, the threat actor concluded the operation in December.
 - Some of the information that hackers managed to steal from the multiple cyberattacks is:
- 14 of the total 200 software repositories,
 - Internal scripts from the repositories,
 - Technical information that described how the development environment operated,
 - Summary of data accessed in Incident 2,
 - DevOps Secrets,
 - Contained configuration data,
 - API secrets,
 - third-party integration secrets,
 - customer metadata,
 - backups of all customer vault data.
 - Backup of LastPass MFA/Federation Database, contained copies of LastPass Authenticator seeds,
 - telephone numbers used for the MFA backup option, etc.