Those settings hash stored passwords using 100,100 iterations of the Password-Based Key Derivation Function (PBKDF2), a hashing scheme that can make it infeasible to crack master passwords that are long, unique, and randomly generated. They should also make sure they're using settings that exceed the LastPass default. LastPass customers should ensure they have changed their master password and all passwords stored in their vault. While cracking the password hashes would require massive amounts of resources, it's not out of the question, particularly given how methodical and resourceful the threat actor was. Also concerning is the fact that user vaults are now in the hands of the threat actor. Given the sensitivity of the data stored by LastPass, it’s alarming that such a wide breadth of personal data was obtained. The steps include decommissioning the hacked development and rebuilding it from scratch, retaining a managed endpoint detection and response service, and rotating all relevant credentials and certificates that may have been affected. Thursday’s update also listed several remedies LastPass has taken to shore up its security following the breach. LastPass representatives didn’t respond to an email asking how many customers had their data copied. “The threat actor was also able to copy a backup of customer vault data from the encrypted storage container, which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully encrypted sensitive fields, such as website usernames and passwords, secure notes, and form-filled data.” Advertisement “To date, we have determined that once the cloud storage access key and dual storage container decryption keys were obtained, the threat actor copied information from backup that contained basic customer account information and related metadata, including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service,” Toubba said. Thursday’s update said that the threat actor could use the source code and technical information stolen from LastPass to hack a separate LastPass employee and obtain security credentials and keys for accessing and decrypting storage volumes within the company’s cloud-based storage service. The same phishers who hit Twilio also breached at least 136 other companies, including LastPass. The threat actor in that breach stole data from 163 of Twilio’s customers. The CEO continued: Advertisementįurther Reading The number of companies caught up in recent hacks keeps growingThe intrusion disclosed in August that allowed hackers to steal LastPass source code and proprietary technical information appears related to a separate breach of Twilio, a San Francisco-based provider of two-factor authentication and communication services. Zero Knowledge refers to storage systems that are impossible for the service provider to decrypt. “These encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user’s master password using our Zero Knowledge architecture,” LastPass CEO Karim Toubba wrote, referring to the Advanced Encryption Scheme and a bit rate that’s considered strong. The hackers also copied a backup of customer vault data that included unencrypted data such as website URLs and encrypted data fields such as website usernames and passwords, secure notes, and form-filled data. In Thursday’s update, the company said hackers accessed personal information and related metadata, including company names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses customers used to access LastPass services. Sensitive data, both encrypted and not, copied At the time, the company said that a threat actor gained unauthorized access through a single compromised developer account to portions of the password manager's development environment and "took portions of source code and some proprietary LastPass technical information." The company said at the time that customers’ master passwords, encrypted passwords, personal information, and other data stored in customer accounts weren't affected. The revelation, posted on Thursday, represents a dramatic update to a breach LastPass disclosed in August. LastPass, one of the leading password managers, said that hackers obtained a wealth of personal information belonging to its customers as well as encrypted and cryptographically hashed passwords and other data stored in customer vaults.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |