Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

LastPass Says Source Code Stolen in Data Breach

Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.

Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.

The company, which is owned by GoTo (formerly LogMeIn), disclosed the breach in an online notice posted Thursday but insisted that the customer master passwords or any encrypted password vault data were not compromised.

LastPass chief executive Karim Toubba said the company’s security team detected unusual activity within portions of the LastPass development environment two weeks ago and launched an investigation that confirmed the source code theft.

From the LastPass notice:

We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. Our products and services are operating normally.


In response to the incident, we have deployed containment and mitigation measures, and engaged a leading cybersecurity and forensics firm. While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity.  

Toubba said the company is evaluating further mitigation techniques to strengthen its environment. 

[ READ: LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack ]

Advertisement. Scroll to continue reading.

Most importantly, LastPass insists that the incident did not compromise Master Passwords that manage access to encrypted vaults in its flagship password manager software.

“We never store or have knowledge of  your Master Password,” Toubba said, noting that LastPass uses Zero Knowledge architecture that ensures the company can never know or gain access to a customer’s Master Password. 

He said the investigation has shown no evidence of any unauthorized access to encrypted vault data or customer data in the LastPass production environment.  

The latest hack comes on the heels on LastPass users being targeted with “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.

LastPass claims more than 30 million users and 85,000 business customers worldwide. 

Related: LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack

Related: Security Flaws in LastPass Exposed User Passwords 

Related: LastPass Flaws Allow Hackers to Steal Passwords

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.