Understanding the LastPass Breach

January 10, 2023

On August 25th, 2022, LastPass announced their discovery of “unusual activity within portions of the LastPass development environment." On December 22, 2022, LastPass updated their statement based on further investigation, and announced that source code, credentials, and encryption keys had been compromised, resulting in the attacker(s) copying encrypted customer data. This document provides an overview of steps you  can take to protect your organization and your third-party network as well as a summary of our investigation and mitigation efforts.

 

Description

LastPass is a password management tool, and provides solutions for personal and professional use. Users create passwords that are protected by a primary password, which is the used to create an encryption key that protects access to the passwords made in the user’s account. This primary password is used to access the “vault” that contains passwords used for other services and accounts, which prevents others from accessing vault-protected passwords. 

 

Security and Impact

LastPass customers may have potentially been impacted by the breach if:

  • Your organization is not using LastPass Federated Login Services, OR
  • Your primary password was not sufficiently long or complex, OR
  • Your primary password is used for another account that had previously been compromised.

If any of these criteria apply, your vault and/or your primary password may have been copied and/or compromised.

Step 1: Determine if you are at risk.

  • If you are using LastPass (and are not utilizing LastPass Federated Login Services), you should immediately change your primary password.
  • Confirm whether any of your critical vendors are at risk from this incident, and document what they have done to mitigate their risk (if applicable).
  • To assess whether your Third Parties are vulnerable, customers can access the “LastPass Breach Questionnaire” in the Whistic platform under our Questionnaire Standards Library by clicking here.
  • If you’d like to download the questionnaire as a spreadsheet, click here.

Step 2: Promptly implement mitigating actions.

  • Make sure your team is aware of the breach and whether it is applicable to your organization..
  • If impacted, immediately change all primary passwords to sufficiently long and complex passwords/passphrases (12+ characters, including numbers and symbols).
  • Rotate the passwords for all accounts that are managed in affected LastPass vaults.

 

Does this affect Whistic?

Whistic does not use LastPass. This breach does not impact our organization.

cybersecurity vendor risk assessment cyber risk management vendor security management

About the author

Whistic
Whistic

The latest insights and updates on information security and third party risk management.

Hate security reviews?
Want FREE AirPods?*

Offer valid for any decision-maker/influencer in relation to your company’s third-party risk management strategy. Company size must exceed 100 employees. Exclusions apply. Limit 1 pair per company.

Close