A Report made for the System and Network Security Module at Newcastle university, all the reports can be seen here
2022 LastPass Breach
Overview
Lastpass suffered two breaches in 2022[1], this page focuses on the one with greater impact, the second breach.
By targeting a DevOps engineer, unauthorized access was gained to cloud backups. These backups contained a wide range of data, including customer data (encyrpted and unencrypted).
Details of attack
A DevOps engineers personal computer was targeted via their installation of Plex Media Server. The installation was many versions behind the most recent version at the time, and was missing security updates.[3]
The specific vulnerability targeted was CVE-2020-5741, which allowed arbitrary python code to be executed on the local system, from the current system user.[3]
To exploit this vulnerability, valid credentials for a Plex account are required by the attacker, these were obtained via a third party data breach[2][3]
The python code exeution was used to install keylogger software, which was used to capture the engineer’s master password for their LastPass Vault. This vault contained secure notes describing how to access critical information for LastPass, and necessary decryption keys.[3]
LastPass became aware of the breach after warnings from Amazon of anomalous behaviour[4]
Attacker Unknown
Categorisation
This is an attack with many steps, so can fall into multiple STRIDE catagories
- A spoofing attack was made on the DevOps engineer’s Plex installation, and multiple other times, using the credentials extracted from the engineer’s vault
- There was an attempt at Tampering when the attacker tried to access Cloud Identity and Access Management roles[4]
- There is a risk of Information disclosure as the information extracted during the breach could be made public, or sold. There’s even a risk of some password being brute force decypted[6]
Negative Impact
The data taken includes (but is not limited to):[5]
- Encrypted customer vaults
- Customer account secrets
- API keys
- One time pads
- Seeds for one time pads
- Customer information
- Including billing address, names and ip address
- Also including Information about Vault encryption configurations
LastPass operated with a breach-assumption policy[6], meaning that all vault data is secure under the event of a breach. The vault is secured via 256 bit AES encryption using a hashed version of the master password as a key[7] and therefore the vault is only susceptible to a brute force attack. So long as a user uses a secure master password, and keeps their password secret, their vault data should be safe.
However, much of the other data extracted is still valuable for a malicious party
The key impact for LastPass will be the substantial reputation hit that they have taken, a password manager such as LastPass, that stores data on the cloud is dependent on customer trust, especially considering this is one of two data breaches that took place, so close together. See this article from WIRED, titled “It’s Time to Ditch This Password Manager” (sorry about the paywall)
Measures Implemented
Below is a list of measures that have been implemented as a result of this breach, from the LastPass incident report:[2]
-
With the assistance of Mandiant, we forensically imaged devices to investigate corporate and personal resources and gather evidence detailing potential threat actor activity.
-
We assisted the DevOps Engineer with hardening the security of their home network and personal resources.
-
We enabled Microsoft’s conditional access PIN-matching multifactor authentication using an upgrade to the Microsoft Authenticator application which became generally available during the incident.
-
We rotated critical and high privilege credentials that were known to be available to the threat actor; we continue to rotate the remaining lower priority items that pose no risk to LastPass or our customers.
-
We began revoking and re-issuing certificates obtained by the threat actor.
-
We analyzed LastPass AWS S3 cloud-based storage resources and applied or started to apply additional S3 hardening measures:
- We put in place additional logging and alerting across the Cloud Storage environment with tighter IAM policies enforced.
- We deactivated prior development IAM users.
- We enabled a policy that prevents the creation and use of long-lived development IAM users in the new development environment.
- We rotated existing production service IAM user keys, applied tighter IP restrictions, and reconfigured policies to adhere to least privilege.
- We deleted obsolete service IAM users from the development and production environments.
- We are enabling IAM resource tagging enforcement on accounts for both users and roles with periodic reporting on non-compliant resources.
-
We rotated critical SAML certificates used for internal and external services.
-
We deleted obsolete/unused SAML certificates used for development, services, or third parties.
-
We revised our 24x7 threat detection and response coverage, with additional managed and automated services enabled to facilitate appropriate escalation.
-
We developed and enabled custom analytics that can detect ongoing abuse of AWS resources.
References
[1]Security incident update - LastPass
[2]Incident additional details - LastPass
[4]LastPass says employee’s home computer was hacked and corporate vault taken
[5]What data was accessed? - LastPass