The container includes both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data. The cyber-criminals were also able to copy a backup of customer vault data from the encrypted storage container, which is stored in a proprietary binary format. With the stolen keys, they were able to further compromise the platform's security by copying a backup that contained "basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service." The black hat hackers obtained the cloud storage access key and dual storage container decryption keys, LastPass says. Now, a follow-up security notice on that same incident is saying otherwise: the malicious actors were able to access some users' data too. Users' data and passwords remained safe and unsoiled. In the original report about the data breach incident discovered in August, LastPass said that "only" the company's source code and proprietary information were compromised. Users should change their passwords asap. The company is now saying that the damage done by the unknown hackers is much worse than was initially assessed. Facepalm: LastPass, one of the most popular password manager services out there, was breached this past August.
0 Comments
Leave a Reply. |