iTnews Asia
  • Home
  • News
  • Security

LastPass source code copied by hacker

LastPass source code copied by hacker

Attacker accessed developer environment.

By Juha Saarinen on Aug 29, 2022 11:19AM

Prominent password management company LastPass has once again suffered a hack, but assured customers their accounts remain safe.

Chief executive Karim Toubba posted on the company's blog that LastPass had determined an unauthorised party had gained access through a single compromised developer account.

The attacker was able to take "portions of the source and some proprietary LastPass technical information," Toubba said.

"In response to the incident, we have deployed containment and mitigation measures and engaged a leading cybersecurity and forensics firm.

While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorised activity," Toubba added.  

The LastPass chief executive said users' Master Passwords were not compromised, as LastPass operates an industry-standard zero-knowledge architecture, meaning the company does not store credentials on its servers.

No user vaults or personal information have been accessed either, LastPass said.

LastPass is an attractive target and has been compromised a number of times in its lifetime, including a 2011 incident that saw some users' email addresses and their salted password hashes transferred from a company database.

In 2015, LastPass again suffered a data breach, that resulted in user account data being compromised.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
identity lastpass passwords security

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.