LastPass recently revealed more details of the second malware attack targeting its infrastructure.It also disclosed the company’s actions to prevent similar attacks in the future. By learning more about the attack, business owners can strengthen their own security weaknesses.

There Were Two Incidents
The threat actor ended the original attack on Aug. 12, 2022. A second attack occurred from Aug. 12, 2022, to Oct. 26, 2022. The two incidents were not seen as related until LastPass began investigating the second attack. Simply put, the threat actor needed information from the second attack to use the data gathered in the first attack.

More Specifics
Some LastPass credentials that the threat actor stole in the first attack were encrypted. They did not have access to the decryption keys, which were only available in a handful of places.

To access those keys, the second attack targeted a DevOps engineer with access to the decryption keys. The threat actor targeted the engineer’s home computer using a vulnerable third-party media package and a keylogger. This provided access to the engineer’s corporate vault at LastPass.

With that access, the threat actor exported the vault entries and shared folder content, including encrypted content and decryption keys.

What Steps LastPass Has Taken
LastPass has taken several notable steps to prevent similar incidents in the future, including:

  • Improving the DevOps engineer’s home security
  • Investigating resources with forensic imaging
  • Rotating credentials the threat actor likely had access to
  • Revoking and then re-issuing certificates the threat actor likely obtained
  • Adding logging and alerting in cloud storage
  • Updating IAM users and keys, including deleting unnecessary users

Conclusion
Malware like that used in the LastPass attacks is a growing threat to consumers and businesses. Business owners need to be aware of the dangers posed by this malware, especially combined with the appeal of credit card information. With strong security measures, businesses can protect critical operational data and customer information. Some best practices include monitoring to check for unexpected purchases and canceling affected cards. Businesses should also set up other safeguards. Overall, businesses need to be proactive and informed. This can prevent malware infections and minimize their effects.

Related Posts - TKS Blog
TKS Newsletter - 2025 May
Here's our May 2025 Newsletter Read the full PDF version here: The TKS Sentinel - May Issue In this month's edition, we discuss: Cloud Security Teams Calls ...
Read more
bdr planbdr plan
How Business Owners Can Weather the Storm: IT Preparedness
Hurricane season officially begins on June 1st, and for business owners in Louisiana and along the Gulf Coast, that means now is the time to...
Read more
drpdrp
Windows 365 Introduces New Disaster Recovery Option
Why Data Loss Is a Business Killer Data loss can be devastating for any organization. From lost revenue to damaged customer trust, the consequences are real...
Read more
How Managed IT Services Help Solve Pressing IT Challenges
Why Businesses Are Turning to Managed IT Services By the end of 2025, the global IT services market is projected to reach a staggering $1.12 trillion....
Read more

Used with permission from Article Aggregator