- Modificato
Emergono nuovi dettagli sul data breach di LastPass precedentemente annunciato il 30/11. Gli hacker hanno avuto accesso a un backup delle casseforti. Sebbene queste siano criptate con la master password scelta dall'utente, è possibile che le casseforti vengano decriptate se la password non è sufficientemente robusta. LastPass consiglia di cambiare le password salvate in tal caso. Degno di nota il fatto che gli URL non siano criptati.
To date, we have determined that once the cloud storage access key and dual storage container decryption keys were obtained, the threat actor copied information from backup that contained basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.
The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data.
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/