Jump to content

LastPass confirms credential stuffing attack against some of its users


David H. Lipman

Recommended Posts

LastPass confirms credential stuffing attack against some of its users

Quote

Password manager app LastPass said today that a threat actor has launched a credential stuffing attack against its users in an attempt to gain access to their cloud-hosted password vaults.

In an email to The Record today, the company said it had not seen any evidence that accounts were successfully compromised in the recent attack that appears to have started earlier this week, on Monday.

LastPass confirmed the attack after tens of users went online today to share that they received security alert emails from the company claiming it blocked a login attempt with a correct master password from a foreign IP address, typically based in Brazil.

Password manager app LastPass said today that a threat actor has launched a credential stuffing attack against its users in an attempt to gain access to their cloud-hosted password vaults.

In an email to The Record today, the company said it had not seen any evidence that accounts were successfully compromised in the recent attack that appears to have started earlier this week, on Monday.

LastPass confirmed the attack after tens of users went online today to share that they received security alert emails from the company claiming it blocked a login attempt with a correct master password from a foreign IP address, typically based in Brazil.

 

credential stuffing attack is when hackers take username and password combinations leaked through data breaches and attempt to use them at other online services, hoping that some users reused credentials across different sites.

Credential stuffing attacks have been a pretty common occurrence in recent years, primarily after the leak of billions of user credentials since the mid-2010s.

These types of attacks have typically been aimed at online services like email providers, gaming accounts, social media profiles, and online shopping sites since these are the typical accounts that, when hacked, can be re-sold on cybercrime markets.

This week’s attack marks the first major credential stuffing incident reported against a password manager service. More specifically, this attack targeted LastPass’s cloud accounts, where users can save and synchronize their local passwords, so they can be reused across different devices.

LastPass’ full statement, provided via email, is below:

LastPass investigated recent reports of blocked login attempts and we believe the activity is related to attempted “credential stuffing” activity, in which a malicious or bad actor attempts to access user accounts (in this case, LastPass) using email addresses and passwords obtained from third-party breaches related to other unaffiliated services. It’s important to note that, at this time, we do not have any indication that accounts were successfully accessed or that the LastPass service was otherwise compromised by an unauthorized party. We regularly monitor for this type of activity and will continue to take steps designed to ensure that LastPass, its users, and their data remain protected and secure.  

But while LastPass claims the recent account compromises was the result of a credential stuffing attack, after this article went live, security researcher Bob Diachenko suggested that this might not be necessarily true, and that hackers simply used a database that leaked from a malware operation, which appears to have also contained LastPass account master passwords.

 

  • Like 1
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.