LastPass, the company known for its popular password manager, and its affiliate, GoTo, are informing customers about a new data breach that appears to be related to a cybersecurity incident disclosed a few months ago.
Remote access solutions provider LogMeIn acquired LastPass in 2015. In February 2022, LogMeIn announced rebranding as GoTo, with the company now also offering unified communications solutions.
In emails sent to customers and a notice posted on its website, LastPass said it recently detected unusual activity within a third-party cloud storage service it shares with GoTo.
The investigation, assisted by Mandiant, is ongoing, but it appears that the new breach is related to an incident disclosed in August 2022.
“We have determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information. Our customers’ passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture,” LastPass said.
The notification published by GoTo on its website also mentions unusual activity within the company’s development environment, in addition to the third-party cloud storage service. It’s possible that the development environment intrusion is the one disclosed previously.
LastPass informed customers in August that it had suffered a data breach that led to the theft of source code and proprietary technical information. The company said at the time that its development environment had been accessed by hackers after a single developer’s account was compromised.
In an update shared in September, the firm said it did not find any evidence of attempts to inject malicious code into its software. The attackers had access to its systems for a period of four days.
For both the incident disclosed now and the one reported in August, the company claimed customers’ vaults were not at risk and its services remained fully functional.
Related: LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack
Related: Twilio Hacked After Employees Tricked Into Giving Up Login Credentials
Related: Uber Investigating Data Breach After Hacker Claims Extensive Compromise

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
Latest News
- Malicious NPM, PyPI Packages Stealing User Information
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
- 98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
- Dutch, European Hospitals ‘Hit by Pro-Russian Hackers’
- Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform
- Ransomware Leads to Nantucket Public Schools Shutdown
- Stop, Collaborate and Listen: Disrupting Cybercrime Networks Requires Private-Public Cooperation and Information Sharing
- Boxx Insurance Raises $14.4 Million in Series B Funding
