The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

LastPass has revealed that hackers stole a master password that they used to access highly restricted corporate databases and information by targeting a senior engineer’s home computer.

The password manager company first revealed that it had been hacked in August last year when it said attackers had accessed the development environment, taking portions of LastPass source code and some proprietary technical information.

At the time, LastPass said there was no evidence that the attackers gained access to customer data or sensitive encrypted vaults.

But this changed last December, when LastPass revealed hackers had stolen vault data containing both encrypted and unencrypted data — including information about customers.

The company has now said attackers used information stolen during the first attack — along with information stolen in other breaches and the exploitation of a cybersecurity vulnerability — to power a second attack.

This attack targeted one of only four senior DevOps engineers who had the required high-level security authentication necessary to use the decryption keys required to access the cloud storage service — and the attackers did so by targeting their home computer.

The exact details of how the attack happened haven’t been disclosed, but LastPass said the DevOps engineer’s home computer was targeted by attackers exploiting what’s described as “a vulnerable third-party media software package”, which let the attackers gain the privileges required for remote code execution.

This tactic gave attackers the opportunity to install keylogger malware on the home computer, allowing them to monitor what the employee typed on their machine. They exploited this information to steal the master password to gain access to the corporate vault.