The threat actor will likely attempt brute force attacks to break the stolen master password hashes and decrypt the copies of vault data taken. The latest disclosure from LastPass included a list of remediations taken to strengthen security, including decommissioning the hacked development system and rebuilding it from scratch, retaining a managed endpoint detection and response service, and rotating all relevant credentials and certificates that may have been affected. While LastPass has been transparent with its disclosures to date, obviously, the theft of user password vaults is bad news for any password-manager solution. Last Pass’s password best practices can be found here. The threat actor may also target customers with phishing and vishing attacks, credential stuffing, or other brute-force attacks against online accounts associated with your LastPass vault. LastPass customers should ensure they have changed their master password and all passwords stored in their vault. In addition, user password vaults were stolen containing unencrypted website URLs and site names as well as encrypted usernames and passwords. December 2022: LastPass disclosed that criminals used some of the information obtained in the earlier breach to steal backup data, including customer names, addresses, phone numbers, email addresses, IP addresses, and partial credit card numbers.Apparently, these keys were not changed immediately after the initial breach was identified, which may have prevented access to the cloud storage.
0 Comments
Leave a Reply. |