LastPass

LastPass

A security incident compromised some of source code and technical information. 

The threat actor’s activity was limited to a four-day period in August 2022 and there is no evidence of any threat actor activity beyond the established timeline.

There is no evidence that this incident involved any access to customer data or encrypted password vaults.

The threat actor gained access to the Development environment using a developer’s compromised endpoint after the developer had successfully authenticated using multi-factor authentication.

Source: https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/?mkt_tok=Njc3LVhOVS0yMDMAAAGGdakhL-Asy5h6YnvgQT-6BefdlHkTN3rkCOtg2hw6m9gQo7vOA0SSDu7R35QejJzXMe0f_-4drk3TRCYQ-ayovK9uDphWw6zmjP0fq1ReX8Cq59OyvQ

TPRM report: https://scoringcyber.rankiteo.com/company/lastpass

"id": "las220261022",
"linkid": "lastpass",
"type": "Cyber Attack",
"date": "08/2022",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'type': 'Organization'}],
 'attack_vector': 'Compromised Endpoint',
 'data_breach': {'type_of_data_compromised': ['Source Code',
                                              'Technical Information']},
 'description': 'A security incident compromised some of the source code and '
                'technical information. The threat actor’s activity was '
                'limited to a four-day period in August 2022 and there is no '
                'evidence of any threat actor activity beyond the established '
                'timeline. There is no evidence that this incident involved '
                'any access to customer data or encrypted password vaults. The '
                'threat actor gained access to the Development environment '
                'using a developer’s compromised endpoint after the developer '
                'had successfully authenticated using multi-factor '
                'authentication.',
 'impact': {'data_compromised': ['Source Code', 'Technical Information'],
            'systems_affected': ['Development Environment']},
 'initial_access_broker': {'entry_point': 'Compromised Endpoint'},
 'title': 'Source Code and Technical Information Breach',
 'type': 'Data Breach'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.