GoTo, the parent company of LastPass, has disclosed that hackers recently broke into its systems and seized encrypted backups belonging to users. It claimed that in addition to LastPass user data, hackers managed to obtain data from its other enterprise products.
The security attack on the DevOps services left the organization scrambling in order to assess the extent of the breach, restrict attackers' access to alter software projects and identify which development secrets had been compromised. The company updated configuration settings, rotated authentication tokens, worked with other providers to expire keys, and investigated the situation.
The company states in an advisory last week, "At this point, we are confident that there are no unauthorized actors active in our systems; however, out of an abundance of caution, we want to ensure that all customers take certain preventative measures to protect your data as well."
In the past year, identity services like Okta and LastPass have acknowledged system vulnerabilities, and developer-focused services like Slack and GitHub have reacted quickly to successful attacks on their infrastructure and source code.
According to Lori MacVittie, a renowned engineer and evangelist at cloud security firm F5, the series of attacks on fundamental enterprise tools reflects the fact that organization should anticipate these types of providers turning into frequent targets in the future.
"As we rely more on services and software to automate everything from the development build to testing to deployment, these services become an attractive attack surface […] We don't think of them as applications that attackers will focus on, but they are," she says.
Lately, threat actors have targeted two major categories of services, i.e. identity and access management systems, and developer and application infrastructure. Both of the given services support the critical components of enterprise infrastructure.
According to Ben Smith, CTO at NetWitness, a detection and response firm, identity is the glue that supports the organizations’ interface in every way, along with connecting the companies to their partners and customers.
"It doesn't matter what product, what platform, you are leveraging, adversaries have recognized that the only thing better than an organization that specializes in authentication is an organization that specializes on authentication for other customers," says Smith.
Meanwhile, developer services and tools have developed into yet another frequently attacked enterprise service. For example, a threat actor accessed the Rockstar Games creators' Slack channel in September and downloaded videos, pictures, and game codes from the upcoming Grand Theft Auto 6 Title. In regards to this, Slack says "a limited number of Slack employee tokens were stolen and misused to gain access to our externally hosted GitHub repository."
Since identity and developer services enable access to a wide range of corporate assets, from application services to operations to source code, compromising these services can be a ‘skeleton key' to the rest of the company, adds Smith. "They are very very attractive targets, which represent low-hanging fruit […] These are classic supply chain attacks — a plumbing attack because the plumbing is not something that is visible on a daily basis."
In order to administer cyber-defense, one of the tactics suggested by Ben Lincoln, managing senior consultant at Bishop Fox, is to organize a comprehensive management of secrets. Companies should be able to “push the button” and rotate all necessary passwords, keys, and sensitive configurations.
"You need to limit exposure, but if there is a breach, you hopefully have a push button to rotate all those credentials immediately," Smith further says. "Companies should plan extensively in advance and have a process ready to go if the worst thing happens."
Organizations can also deceive intruders using traps. Security teams can receive a high-fidelity warning that attackers might be on their network or using a service by employing various honeypot-like tactics. Credential canaries—fake accounts and credentials—help identify when threat actors have access to critical assets. However, in all other ways, the companies must prioritize the need to apply zero-trust principles in order to minimize the attack surface area of — not just machines, software, and services but also operations, according to MacVittie.
On 22nd December 2022, online password management service LastPass revealed that threat actors can steal sensitive information from user accounts like billing, end-user names, email IDs, IP address info, and telephone numbers.
The leak also includes customer vault data, which consists of both unencrypted data like website URLs and encrypted data like website usernames and passwords, form-filled data, and secure notes. An earlier hack of customer data in August 2022 led to this more severe data breach.
The data of all 30 million LastPass users stored on the company servers as of August 2022 is at risk. Hackers possess a copy of your entire pad vault. In case a hacker manages to crack your master password, they can take full control of your online life. It means full access to your bank accounts, emails, tax information, healthcare data, social media accounts, and much more.
As per LastPass, hackers may try using brute force for finding out your master password and decode the copies of vault data they have stolen. But, LastPass says it is highly unlikely- to brute force and guess master passwords can take up to a million years if a user has strong secured passwords. But do users really have safe passwords?
Experts have raised doubts about LastPass' recent updates. “The statement is full of omissions, half-truths, and outright lies," says Wladimir Palant, security researcher and creator of AdBlock Plus. "The hack a far more grave threat than reported – both to individual users as well as companies that employ LastPass for corporate password management," said senior security researcher John Scott Railton.
Jeremi Gosney, a senior information security engineer at Yahoo has also been very critical of the response received from LastPass, and the company's approach to security. He said "in the last 10 years. I don't know what the threshold of "number of major breaches users should tolerate before they lose all faith in the service" is, but surely it's less than 7."
Another password service competitor 1Password doubts the "millions of years" claim made by LastPass, the former believes that the claim lies on the assumption 12 character passwords of LastPass users are generated via an entirely random process. However, in today's age, threat actors can crack your passwords in just 30 minutes if they happen to have the latest tools and technology.
LastPass, a password management firm was hacked two weeks ago, allowing hackers to steal the company's and proprietary technical data.
The incident surfaced after Bleeping Computer came to know about the breach from insiders and contacted the company last week. According to experts, the employees faced difficulties to contain the breach after LastPass was compromised.
LastPass issued a security advisory accepting the company was compromised through a breached developer account that attackers use to gain access to the company's developer environment.
According to LastPass, there is no evidence that encrypted password vaults or customer data were compromised, but the attackers did steal "proprietary LastPass technical data" and chunks of their source code.
Responding to the incident, the company has deployed containment and mitigation measures and hired a leading cybersecurity agency to look into the issue.
The investigation is in process, LastPass said the containment state has been achieved, it has applied advanced security measures, and hasn't noticed any further evidence of malicious activity.
The company didn't disclose any further details related to the attack, like how the attackers breached the developer account and what source code was stolen.
LastPass is one of the largest password management companies in the world, it has more than 33 million users and 100,000 businesses.
As businesses and customers use the company's software to keep their passwords safely, there are also worries that if the company was compromised, it could let attackers get access to stored passwords.
But we should note that LastPass stores passwords in 'encrypted vaults' that can only be decoded via a customer's master password, which, according to the company, was not compromised.
In 2021, LastPass was bit by a credential stuffing attack that enabled attackers to cross-check a user's master password. Besides this, it was also disclosed that threat actors stole LastPass master passwords and distributed the Redline password-stealing malware.
Because of this, you should always use two-factor authentication for your LastPass accounts so that the threat actors can't access your account even after it has been compromised.
"Based on what we have learned and implemented, we are evaluating further mitigation techniques to strengthen our environment. We have included a brief FAQ below of what we anticipate will be the most pressing initial questions and concerns from you. We will continue to update you with the transparency you deserve," said LastPass.
CySecurity will update its readers about further updates.