LastPass recently revealed more details of the second malware attack targeting its infrastructure.It also disclosed the company’s actions to prevent similar attacks in the future. By learning more about the attack, business owners can strengthen their own security weaknesses.

There Were Two Incidents
The threat actor ended the original attack on Aug. 12, 2022. A second attack occurred from Aug. 12, 2022, to Oct. 26, 2022. The two incidents were not seen as related until LastPass began investigating the second attack. Simply put, the threat actor needed information from the second attack to use the data gathered in the first attack.

More Specifics
Some LastPass credentials that the threat actor stole in the first attack were encrypted. They did not have access to the decryption keys, which were only available in a handful of places.

To access those keys, the second attack targeted a DevOps engineer with access to the decryption keys. The threat actor targeted the engineer’s home computer using a vulnerable third-party media package and a keylogger. This provided access to the engineer’s corporate vault at LastPass.

With that access, the threat actor exported the vault entries and shared folder content, including encrypted content and decryption keys.

What Steps LastPass Has Taken
LastPass has taken several notable steps to prevent similar incidents in the future, including:

  • Improving the DevOps engineer’s home security
  • Investigating resources with forensic imaging
  • Rotating credentials the threat actor likely had access to
  • Revoking and then re-issuing certificates the threat actor likely obtained
  • Adding logging and alerting in cloud storage
  • Updating IAM users and keys, including deleting unnecessary users

Conclusion
Malware like that used in the LastPass attacks is a growing threat to consumers and businesses. Business owners need to be aware of the dangers posed by this malware, especially combined with the appeal of credit card information. With strong security measures, businesses can protect critical operational data and customer information. Some best practices include monitoring to check for unexpected purchases and canceling affected cards. Businesses should also set up other safeguards. Overall, businesses need to be proactive and informed. This can prevent malware infections and minimize their effects.

Related Posts - TKS Blog

TKS Newsletter - 2024 December
Here's our December 2024 Newsletter Read the full PDF version here: The TKS Sentinel - December Issue In this month's edition, we discuss: Ransomware Threats PDF Hijacking ...
Read more
5 New Trends from a Study on the State of AI at Work
5 New Trends of AI At Work
The pace of technological advancement is accelerating. This is not news to anyone wading through the ChatGPT craze. Artificial intelligence (AI) is at the forefront...
Read more
pitfalls of cyber attack
Avoid These Data Breach Damage Control Pitfalls
Data breaches are an unfortunate reality for businesses of all sizes. When a breach occurs, the immediate response is critical. How a company manages the...
Read more
voice technology options
Harnessing the Power of Voice Technology
Voice technology is quickly becoming one of the most valuable tools for businesses seeking to improve customer interactions, streamline operations, and cut costs. With...
Read more

Used with permission from Article Aggregator