PCMag editors select and review productsindependently. If you buy through affiliate links, we may earn commissions, which help support ourtesting.

LastPass Suffers Another Breach, and This Time Customer Data Is Affected

The hacker used data obtained from an August breach to gain access to customer information. LastPass is still investigating the incident.

ByMichael Kan

My Experience

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Full Bio
(Credit: LastPass)

The data breachLastPasssuffered in August enabled a hacker to infiltrate the company again and steal customer information.

On Wednesday, LastPass announced it was investigating the breach, which involved a third-party cloud storage service connected to company systems.

“We have determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information,” the company wrote in ablog post(Opens in a new window).

What data was stolen remains unclear. But LastPass has said customers' passwords should remain safe, since the companydoesn’t store(Opens in a new window)information on the “Master Password” customers use to access the encrypted password vaults over the platform.

“We are working diligently to understand the scope of the incident and identify what specific information has been accessed. In the meantime, we can confirm that LastPass products and services remain fully functional,” the company said.

Still, the incident shows theAugust breachat LastPass was more serious than initially thought. At the time, the company said the August breach only ensnared its internal systems for software development —not any data concerning customer passwords. Nevertheless, the hacker was able to steal portions of company source code and some proprietary LastPass technical information, which likely paved the way for the follow-up intrusion.

In September, LastPass also said it had concluded itsinvestigationinto the breach with the help of cybersecurity firm Mandiant. The results found the hacker only had access to the internal systems for four days. No evidence was found of any tampering either. But it seems LastPass still failed to uncover all the potential ways the hacker could use the access to breach the company again.

LastPass didn’t name the third-party cloud storage service the hacker used to breach the company for a second time. But LastPass has been sharing the cloud storage service with its affiliate GoTo. Both companies are currentlyownedby private equity firms.

In response to the new breach, LastPass has deployed additional security measures and monitoring of the company’s IT infrastructure. It's also contacted Mandiant and law enforcement about investigating the hack.

SecurityWatch<\/strong> newsletter for our top privacy and security stories delivered right to your inbox.","first_published_at":"2021-09-30T21:22:09.000000Z","published_at":"2022-03-24T14:57:33.000000Z","last_published_at":"2022-03-24T14:57:28.000000Z","created_at":null,"updated_at":"2022-03-24T14:57:33.000000Z"})" x-show="showEmailSignUp()" class="rounded bg-gray-lightest text-center md:px-32 md:py-8 p-4 mt-8 container-xs">

Like What You're Reading?

Sign up forSecurityWatchnewsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to ourTerms of UseandPrivacy Policy. You may unsubscribe from the newsletters at any time.


那nks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

PCMag Stories You’ll Like

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan

Baidu
map