• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

LastPass Hack: Attacker Accessed DevOps Engineer’s Home Computer to Steal Decrpytion Keys

LastPass reveals new information on its ongoing investigation into a security incident, including how a developer's home computer was hacked.

February 28, 2023 Zachary Comeau Leave a Comment

LastPass Breach, Hack
stock.adobe.com/Tada Images

[Editor’s note: This article has been updated to reflect the company’s official statement on the new updates.]

The same threat actor that accessed portions of the LastPass development environment and source code that has forced the company since August 2022 to provide updates as new information is revealed, apparently accessed a shared cloud-storage environment obtained access keys and decryption keys by targeting a developer’s home computer.

The security incident, now thought to be related to an August 2022 incident, is the fourth update the company has issued on the matter and sheds light on the security issues inherent in distributed work environments and vulnerability of home networks.

According to Boston, Mass.-based LastPass, the threat actor leveraged information stolen during the first incident, information available from a third-party data breach, and a vulnerability yin a third-party media software package to launch the coordinated second attack.

In an update, the company says the attack targeted LastPass infrastructure, resources and an employee. The attack leveraged different tools and methods from the attack discovered last summer, leading the company to at first believe that the incidents were not related.

“Our investigation has revealed that the threat actor pivoted from the first incident, which ended on August 12, 2022, but was actively engaged in a new series of reconnaissance, enumeration, and exfiltration activities aligned to the cloud storage environment spanning from August 12, 2022 to October 26, 2022,” the company says in a new update.

In response, LastPass created a guide to help LastPass business administrators and security analysts assess and understand the actions they should take.

The company has also created a PDF document that details the incidents, what data was accessed, what actions business and consumers should take, what the company has done in response and what LastPass will do going forward.

However, the information was originally difficult to find on the company’s website earlier this week. Spotted by Bleeping Computer, the support documents about the incident are not listed in search engines, as the company added <meta name=”robots” content=”noindex”> HTML tags to the document to prevent them from being indexed by search engines.

However, CEO Karim Toubba gave an official statement on the new updates, essentially repeating what those advisories and documents say, as well as explaining the company’s response timeline.

“We have heard and taken seriously the feedback that we should have communicated more frequently and comprehensively throughout this process,” Toubba says. “The length of the investigation left us with difficult trade-offs to make in that regard, but we understand and regret the frustration that our initial communications caused for both the businesses and consumers who rely on our products. In sharing these additional details today, and in our approach going forward, we are determined to do right by our customers and communicate more effectively.”

New information emerges

According to the company’s update, the threat actor leveraged valid credentials stolen from a senior DevOps engineer to access a shared cloud-storage environment, making it difficult for investigators to differentiate between threat actor activity and legitimate use.

Amazon Web Services (AWS) GuardDuty Alerts informed LastPass of the anomalous behavior as the threat actor attempted to use Cloud Identity and Access Management (IAM) roles to perform unauthorized activity, the company says.

To access the cloud-based storage resources – notably S3 buckets which are protected with either AWS S3-SSE encryption, AWS S3-KMS encryption, or AWS S3-SSE-C encryption – the threat actor needed to obtain AWS Access Keys and the LastPass-generated decryption keys. The encrypted cloud-based storage services house backups of LastPass customer and encrypted vault data.

As mentioned in the first incident summary, certain LastPass credentials stolen during the first attack were encrypted and the threat actor did not have access to the decryption keys, which could only be retrieved from two locations:

  1. A segregated and secured implementation of an orchestration platform and key-value store used to coordinate backups of LastPass development and production environments with various cloud-based storage resources, or

  2. A highly restricted set of shared folders in a LastPass password manager vault that are used by DevOps engineers to perform administrative duties in these environments.

To obtain those decryption keys needed to access the AWS S3 buckets, the threat actor targeted one of the four DevOps engineers who had access to those decryption keys. The threat actor targeted the engineer’s home computer, exploited a third-party media software package bug to gain remote code execution and implanted keylogger malware.

This allowed the attacker to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gained access to the DevOps engineer’s LastPass corporate vault.

The threat actor then exported the native corporate vault entries and content of shared folders, which contained encrypted secure notes with access and decryption keys needed to access the AWS S3 LastPass production backups, other cloud-based storage resources, and some related critical database backups, the company says.

The company says it has performed the following work:

  • With the assistance of Mandiant, we forensically imaged devices to investigate corporate and personal resources and gather evidence detailing potential threat actor activity.
  • We assisted the DevOps Engineer with hardening the security of their home network and personal resources.
  • We enabled Microsoft’s conditional access PIN-matching multifactor authentication using an upgrade to the Microsoft Authenticator application which became generally available during the incident.
  • We rotated critical and high privilege credentials that were known to be available to the threat actor; we continue to rotate the remaining lower priority items that pose no risk to LastPass or our customers.
  • We began revoking and re-issuing certificates obtained by the threat actor.
  • We analyzed LastPass AWS S3 cloud-based storage resources and applied or started to apply additional S3 hardening measures:
    • We put in place additional logging and alerting across the Cloud Storage environment with tighter IAM policies enforced.
    • We deactivated prior development IAM users.
    • We enabled a policy that prevents the creation and use of long-lived development IAM users in the new development environment.
    • We rotated existing production service IAM user keys, applied tighter IP restrictions, and reconfigured policies to adhere to least privilege.
    • We deleted obsolete service IAM users from the development and production environments.
    • We are enabling IAM resource tagging enforcement on accounts for both users and roles with periodic reporting on non-compliant resources.
  • We rotated critical SAML certificates used for internal and external services.
  • We deleted obsolete/unused SAML certificates used for development, services, or third parties.
  • We revised our 24×7 threat detection and response coverage, with additional managed and automated services enabled to facilitate appropriate escalation.
  • We developed and enabled custom analytics that can detect ongoing abuse of AWS resources.

What should businesses do?

LastPass recommends an organizations’ IT professionals and security analysts review this document on recommended actions on these topics:

  1. Master password length and complexity
  2. Iteration counts for master passwords
  3. Super admin best practices
  4. MFA shared secrets
  5. SIEM Splunk integration
  6. Exposure due to unencrypted data
  7. Deprecation of Password apps (Push Sites to Users)
  8. Reset SCIM, Enterprise API, SAML keys
  9. Federated customer considerations
  10. Additional considerations

Follow our coverage of the LastPass incident:

  • LastPass Confirms Security Incident
  • This Week in IT: AWS re:Invent, Cuba Ransomware, LastPass Incident
  • Password Management Company Warns of Potential for Credential Attacks

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, LastPass

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.