{"id":26592,"date":"2022-09-18T00:16:00","date_gmt":"2022-09-17T22:16:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=26592"},"modified":"2022-09-17T11:48:53","modified_gmt":"2022-09-17T09:48:53","slug":"lastpass-besttigt-angreifer-hatten-vier-tage-zugriff-auf-interne-systeme","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/09\/18\/lastpass-besttigt-angreifer-hatten-vier-tage-zugriff-auf-interne-systeme\/","title":{"rendered":"LastPass confirmed: Attackers had access to internal systems for four days"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=272955\" target=\"_blank\" rel=\"noopener\">German<\/a>]The developers of the web-based password manager online service LastPass announced this week that attackers had access in August 2022 to internal systems for four days. Then the unauthorized access has been detected. However, the attackers probably did not succeed in gaining write access to the development environment and modifying code of the LastPass software or accessing sensitive user data.<\/p>\n<p><!--more--><\/p>\n<h2>The LastPass hack<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg01.met.vgwort.de\/na\/f87140bfe41d4139a326395587eb12cf\" width=\"1\" height=\"1\">In late August 2022, password manager online service LastPass informed its users that unauthorized third parties had gained access to its internal development environment. Two weeks prior to this notification, the company had noticed unusual operations in the LastPass development environment. Unauthorized third parties had managed to gain access to parts of the LastPass development environment. I had reported on the incident in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/08\/26\/lastpass-sicherheitsvorfall-entwicklungsumgebung-gehackt-25-august-2022\/\">LastPass security incident: Development environment hacked (August 25, 2022)<\/a>.<\/p>\n<h2>More details published<\/h2>\n<p>Meanwhile, online service LastPass, along with security specialists from Mandiant, conducted a detailed investigation into the incident and <a href=\"https:\/\/blog.lastpass.com\/2022\/08\/notice-of-recent-security-incident\/\" target=\"_blank\" rel=\"noopener\">released new findings<\/a> as of Sept. 15, 2022.&nbsp; <\/p>\n<h3>Attack via a compromised developer account<\/h3>\n<p>The analysis revealed that the threat actor gained access to the LastPass development environment via a developer's compromised endpoint. Although it is unclear what method the attacker initially used to compromise developer access, it appears certain that only that access was abused. LastPass writes that the threat actor impersonated the developer to successfully log in via multi-factor authentication. <\/p>\n<h3>Access for only four days <\/h3>\n<p>Subsequently, the attacker used this persistent access to access the development system. The investigation revealed that the attackers only had access to the company's IT systems during a four-day period in August 2022. The LastPass security team detected the threat actor's activities and was subsequently able to contain the incident.&nbsp; <\/p>\n<h3>No sensitive user data accessed<\/h3>\n<p>There was no evidence of activity by the threat actor beyond the specified time period, LastPass says. Furthermore, they found no evidence that the intruder was able to gain access to customer data or encrypted password vaults. \u202fThis was probably successfully prevented by the system design. <\/p>\n<p>The LastPass development environment is physically separate from and has no direct connection to the production environment. The development environment does not contain any customer data or encrypted vaults.&nbsp; Further, LastPass does not have access to the master passwords of its customers data safes &#8211; without the master password, it is not possible for anyone other than the owner of data safe to decrypt the vault's data. This is part of the LastPass Zero Knowledge security model.<\/p>\n<h3>LastPass code integrity assured<\/h3>\n<p>One question that remained was whether the code for LastPass could possibly be modified. By separating the development and production environments, attackers could not access the production system. <\/p>\n<p>To verify the integrity of the code, an analysis of the source code and production builds was performed. No evidence of attempts at code poisoning or malicious code injection was found. Developers do not have the ability to transfer source code from the development environment to the production environment. This ability is limited to a separate build-release team and can only happen after completing rigorous code review, testing and validation processes. It looks like LastPass got off with a \"black eye.\" The design of the development and production environments has also contributed to this. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lastpass-says-hackers-had-internal-access-for-four-days\/\" target=\"_blank\" rel=\"noopener\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The developers of the web-based password manager online service LastPass announced this week that attackers had access in August 2022 to internal systems for four days. Then the unauthorized access has been detected. However, the attackers probably did not succeed &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/09\/18\/lastpass-besttigt-angreifer-hatten-vier-tage-zugriff-auf-interne-systeme\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-26592","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/26592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=26592"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/26592\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=26592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=26592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=26592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}