Back in August 2022,Watch Gun Hill Online password manager LastPass suffered a massive breach.
A still-unknown cyber criminal successfully targeted one of LastPass' four DevOps engineers who had access to the decryption keys for the cloud storage service. Using the engineer's stolen credentials, the hacker was able to infiltrate LastPass' systems undetected. This breach lasted for months and continued even after LastPass believed the threat had been contained.
The LastPass breach enabled the threat actor to obtain access to the "backup customer vault data." According to the company, encrypted data such as usernames and passwords as well as unencrypted data like website URLs were affected.
Breaches at large companies and online platforms are not new. In the case of the LastPass breach, hackers don't need to find some technical flaw to exploit either.
SEE ALSO: Have you been impacted by a scam or security breach?By targeting the human beings who work at these companies, using tactics such as social engineering, every organization technically has a weakness that can be taken advantage of.
However, the LastPass breach was different.
Hackers breached a password manager, a platform meant to protect your passwords and make it possible to use highly secure credentials for each of your logins. And it proved highly successful for the hackers.
Over the past few months, there have been a numberof reportsdetailing how the LastPass breach appears to be linked to cryptocurrency-related heists. Hundreds of millions of dollars have allegedly been stolen allegedly as a result of the LastPass breach.
In one such incident, U.S. federal investigators claim that the LastPass breach seems to be the source of a cryptocurrency heist that resulted in $150 million being stolen from a crypto wallet last year. Authorities arrived at this conclusion after finding that the login credentials were stored in the victim's password manager. In addition, investigators did not find any evidence that the victim's devices were hacked.
And it appears that the worst is yet to come.
Thanks to the hackers' success with the LastPass intrusion, password managers are now under attack. Hackers have realized that instead of wasting time breaking into one platform at a time when targeting a user, they can gain access to all of their login credentials if they can break into their target's password manager.
Here's a great example of how hackers are honing in on password managers and even getting creative in order to target them.
Just a year and a half after the LastPass breach, a threat actor was somehow able surpass Apple's usually stringent review process in order to convince the company to approve a fake LastPass appin the App Store. The LastPass imposter was basically a phishing app that attempted to fool LastPass users into believing it was the official app so they would input their login credentials, which would then go right to the bad actor who created it. It's unclear how many, if any, LastPass users were affected by this specific incident, but it shows what great lengths cyber criminals are going to in targeting password managers.
But, don't be fooled into thinking this is just about LastPass. Hackers are targeting password managers in general. A new reportreleased last month from cybersecurity firm Picus Security found that 25 percent of all malware is now targeting password managers or other credential storage services.
"Threat actors are leveraging sophisticated extraction methods...to obtain credentials that give attackers the keys to the kingdom," said Picus Security co-founder and VP of Picus Labs, Dr. Suleyman Ozarslan.
There are a few lessons here going forward.
For one, we can no longer assume that just because you're using a password manager that your login credentials are somehow more secure. It might be more convenient to use, but breaches can still happen.
Users looking into password managers should should also prioritize encryption. Hackers were able to obtain plain-text website URLs in the LastPass hack. While this may not seem crucial on its own, it provides hackers with a blueprint basically. It shows what platforms you have accounts on, which can be an extremely important tool for a hacker looking to craft a phishing email.
It might not have been as easy to obtain the login credentials themselves, but they knew exactly where to go and how to target users in order to gain unauthorized access. In May 2024, LastPass learned from its mistakes and the company announced it was rolling out URL encryption.
But, the most important lesson is the importance of two-factor authentication. Yes, you may use a password manager in order to make the login process as easy as possible and two-factor authentication will require that you input credentials to get passed yet another layer of security. But, even if a hacker were to break into your password manager and steal your password, they still couldn't access your account unless they had access to your physical mobile device.
Also, in the event that your password manager is breached, you'll need to change your password. No, not just your master password. You should change your password for each and every platform with a login credential saved in your password manager.
Have a story to share about a scam or security breach that impacted you? Tell us about it. Email [email protected]with the subject line "Safety Net" or use this form. Someone from Mashable will get in touch.
Topics Cybersecurity
Chris Kelly on comedy, hating Twitter, and being an outsider'One Day at a Time' rescued after Netflix cancelation by Pop TVRicky Gervais and Seth Rogen had a gloriously phallic Twitter exchangeMark Zuckerberg says Facebook is 'evaluating' deepfake policyUber got in a fight with California, so it's moving its selfThe 10 best new TV shows of 2019 so farKoala kontent: The shining beacon of hope that kept us smiling in 2016Humanitarian travel: Photo workshops that give backThe BTS game has the ARMY flipping out over pretty much everythingAnimal shelter celebrates their empty kennels with a joyous videoRockettes can skip the inauguration, thanks to the internetAdam Scott roasts Mitch McConnell for using a 'Parks & Rec' GIF'Yesterday' is lowRory McIlroy had a very blunt response to Tiger Woods' Christmas outfitNo one cares about 99% of the photos you take. Not even you.9 times 'Planet Earth II' took 2016 by stormThe 10 best video games of 2019 so farFacebook 'lurking' is making you miserable and here's what you can do about itHarris sends Biden into a meltdown with poignant speech on raceApple moves production of Mac Pro from U.S. to China No mercy: Facebook page held hostage in payment dispute Teacher has totally amazing reaction to gift from his students The views from these coastal homes will take your breath away Delight in the old Tech we lost: RIP Vine, Meerkat and the headphone jack Tiger Woods continues making suspect decisions, golfs with Donald Trump All Kesha wants for Christmas is for you to hear her new music Carrie Fisher rushed to hospital after heart attack on plane World's first 'Maori emoji app' embraces culture, country and cute animals Need a resolution for 2017? Quit saying these words and phrases This is why you should be friends with Russell Wilson on Christmas Donald Trump just posted his scariest tweet yet Irony alert: Mondelez picks Singapore as its chewing gum 'center of excellence' Rockettes can skip the inauguration, thanks to the internet The 10 best 'Saturday Night Live' sketches of 2016 NYC's 'Subway Therapy' wall is transformed into a brilliant interactive holiday card Airport lets romantic man use the baggage carousel for a surprise proposal New Orleans Santa Claus inspires the best Twitter thread of the holiday season 'That Dragon, Cancer' team makes a VR mystery game for Daydream Kid's festive Christmas drawing accidentally ends up very, very NSFW
2.0859s , 10133.5234375 kb
Copyright © 2025 Powered by 【Watch Gun Hill Online】,Openness Information Network