Last Thursday LastPass updated their 25 August security incident bulletin with additional details on what customer information had been exposed and additional details of the follow-up breach in November of this year. The investigative team discovered that the threat actor used information stolen in the August breach to target an employee to access their cloud-based storage systems. These systems store encrypted backups of customer account information, which the threat actors were able to acquire decryption keys for. Additionally, the backups contain customer vault data. LastPass reports that this vault data is a combination of unencrypted fields such as URLs and encrypted fields such as usernames and passwords. The encryption method for the encrypted fields uses the customer’s master password, which means these fields are protected from the threat actor by the strength of the individual user’s master password.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security