Application Security

LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack

Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.

<p><span><strong><span>Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.</span></strong></span></p>

Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.

That’s the official word from LastPass in response to public reports that some users received blocked access emails warnings that are normally sent to users who log in from different devices and locations.

The email notifications raised fears of a data compromise at the LogMeIn-owned startup that claims more than 30 million users and 85,000 business customers worldwide. However, in a note credited to VP of Engineering Gabor Angyal, LastPass downplayed the severity of the issue and said the warnings were linked to known credential-stuffing attacks.

[ READ: Why Are Users Ignoring Multi-Factor Authentication? ]

Here’s the LastPass explanation:

We recently investigated reports of an uptick of users receiving blocked access emails, normally sent to users who log in from different devices and locations.

Our initial findings led us to believe that these alerts were triggered in response to attempted “credential stuffing” activity, in which a malicious or bad actor attempts to access user accounts (in this case, LastPass) using email addresses and passwords obtained from third-party breaches related to other unaffiliated services. 

We quickly worked to investigate this activity and, at this time, have no indication that any LastPass accounts were compromised by an unauthorized third-party as a result of these credential stuffing attempts, nor have we found any indication that user’s LastPass credentials were harvested by malware, rogue browser extensions, or phishing campaigns.

Advertisement. Scroll to continue reading.

Angyal admitted that some of the security alerts were sent by LastPass in error but he did not elaborate on the scale of the problem or the errors that caused users to post nervous social media posts flagging the issue.

“Our investigation has since found that some of these security alerts, which were sent to a limited subset of LastPass users, were likely triggered in error. As a result, we have adjusted our security alert systems and this issue has since been resolved,” Angyal said.

The LastPass VP urged customers to use a strong Master Password and never re-use that password for any other website or app.  In response to the ongoing credential-stuffing attacks, Angyal is recommending that users immediately change LastPass Master Passwords and enable multi-factor authentication on all accounts.

Related: LastPass Patches Bug Leaking Last-Used Credentials 

Related: Overall Security of Password Managers Debatable

Related: Flaws Allowed Hackers to Bypass LastPass 2FA

Related: LastPass Flaws Allow Hackers to Steal Passwords

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version