LKToner

2022 LastPass Data Breach

Lucas Toner

2023/09/27

A Report made for the System and Network Security Module at Newcastle university, all the reports can be seen here


2022 LastPass Breach


Overview

Lastpass suffered two breaches in 2022[1], this page focuses on the one with greater impact, the second breach.

By targeting a DevOps engineer, unauthorized access was gained to cloud backups. These backups contained a wide range of data, including customer data (encyrpted and unencrypted).

Details of attack

A DevOps engineers personal computer was targeted via their installation of Plex Media Server. The installation was many versions behind the most recent version at the time, and was missing security updates.[3]

The specific vulnerability targeted was CVE-2020-5741, which allowed arbitrary python code to be executed on the local system, from the current system user.[3]

To exploit this vulnerability, valid credentials for a Plex account are required by the attacker, these were obtained via a third party data breach[2][3]

The python code exeution was used to install keylogger software, which was used to capture the engineer’s master password for their LastPass Vault. This vault contained secure notes describing how to access critical information for LastPass, and necessary decryption keys.[3]

LastPass became aware of the breach after warnings from Amazon of anomalous behaviour[4]

Attacker Unknown

Categorisation

This is an attack with many steps, so can fall into multiple STRIDE catagories

Negative Impact

The data taken includes (but is not limited to):[5]

LastPass operated with a breach-assumption policy[6], meaning that all vault data is secure under the event of a breach. The vault is secured via 256 bit AES encryption using a hashed version of the master password as a key[7] and therefore the vault is only susceptible to a brute force attack. So long as a user uses a secure master password, and keeps their password secret, their vault data should be safe.

However, much of the other data extracted is still valuable for a malicious party

The key impact for LastPass will be the substantial reputation hit that they have taken, a password manager such as LastPass, that stores data on the cloud is dependent on customer trust, especially considering this is one of two data breaches that took place, so close together. See this article from WIRED, titled “It’s Time to Ditch This Password Manager” (sorry about the paywall)

Measures Implemented

Below is a list of measures that have been implemented as a result of this breach, from the LastPass incident report:[2]

References

[1]Security incident update - LastPass

[2]Incident additional details - LastPass

[3]LastPass Hack: Engineer’s Failure to Update Plex Software Led to Massive Data Breach - Ravie Lakshmanan

[4]LastPass says employee’s home computer was hacked and corporate vault taken

[5]What data was accessed? - LastPass

[5]LastPass data breach - University of Washington

[6]LastPass technical whitepaper - LastPass