LastPass VPs confirm ‘no indication’ of compromised accounts after security alerts

Two LastPass vice presidents have launched statements in regards to the state of affairs surrounding LastPass security points that got here to gentle this week. 

Two days in the past, a whole lot of LastPass customers took to Twitter, Redditand other sites to complain that they have been getting alerts about their grasp password being utilized by somebody who was not them. Some reported that even after altering their grasp password, somebody tried to entry their account once more. 

On Tuesday, the corporate released a brief statement noting that its security staff noticed and acquired reviews of potential credential stuffing makes an attempt. Credential stuffing entails attackers stealing credentials (usernames, passwords, and many others.) to entry customers’ accounts.

“While we now have noticed a small uptick on this exercise, we’re using a number of technical, organizational, and operational strategies designed to guard towards credential stuffing makes an attempt. Importantly, we additionally wish to reassure you that there is no such thing as a indication, right now, that LastPass or LogMeIn have been breached or compromised,” wrote Gabor Angyal, VP of engineering at LastPass. 

On Wednesday, the corporate expanded Angyal’s unique assertion, explaining that it not too long ago investigated reviews of an uptick of customers receiving blocked entry emails, usually despatched to customers who log in from totally different units and places. The firm’s preliminary findings led it to imagine that these alerts have been triggered in response to tried “credential stuffing” exercise. 

Angyal’s Wednesday assertion stated, “Out of an abundance of warning, we continued to research in an effort to find out what should be blamed for the automated security alert emails to be triggered from our techniques. Our investigation has since discovered that some of these security alerts, which have been despatched to a restricted subset of LastPass customers, have been doubtless triggered in error. As a consequence, we now have adjusted our security alert techniques and this challenge has since been resolved.” 

Angyal famous that at “no time does LastPass retailer, have data of, or have entry to a person’s Master Password(s).”

LastPass VP of product administration Dan DeMichele despatched out a discover to multiple outlets with the identical info that was shared within the up to date assertion from Angyal. 

Some online weren’t assuaged by the assertion, noting the qualifiers used that prompted extra questions. 

Craig Lurey, CTO of password supervisor Keeper, stated that what’s so regarding about credential stuffing assaults is that attackers prey on a highly-prevalent drawback amongst shoppers proper now: breach fatigue. 

“With a slew of breaches and alerts all through 2021, shoppers have turn into apathetic to compromised accounts. In truth, a current survey from the Identity Theft Resource Center revealed that 16% of breach victims take completely no motion to re-secure their accounts,” Lurey stated. 

“In their minds, the ‘knowledge is already on the market,’ the hacked group will take care of it, they do not know what to do, or, mockingly, they dismiss the notification as a rip-off. This apathy is what cybercriminals thrive on and is why we are able to anticipate to see an increase in credential stuffing alerts.”

Due to the issues over grasp passwords, Perimeter 81 CEO Amit Bareket recommended utilizing biometric authentication or MFA for grasp passwords with managers like LastPass. 

Parent firm LogMeIn introduced simply two weeks in the past that it’s spinning off LastPass into its personal firm. 



https://www.zdnet.com/article/lastpass-vp-says-no-indication-that-accounts-compromised-or-credentials-harvested-after-reports/

Related Posts