LastPass Corporate Network Breach – What You Should Know

Mon. Aug. 29th Update: CyberHoot isn’t the only one to caution about throwing the Baby out with the Bath Water when reacting to the LastPass password management company breach.  Here is another excellent article from our friends at Naked Security (another great source of cybersecurity information and analysis) about this breach.  They remain steadfastly in support of Password Manager Adoption.  They even have their answers to the most commonly asked questions following this LastPass breach.

Aug. 25th 2022, LastPass reported a breach of its corporate network to users of its password management solution.  They stated that no user data was stolen, but source code was.  Since CyberHoot recommends adopting a password manager, we’re providing these talking points to our clients and users.
 

LastPass Breach Facts and Talking Points

  1. The LastPass product wasn’t breached, rather their corporate network was. No client data of any kind was stolen.
  2. No software ever written is perfect, including LastPass, Excel, or any other password manager.  Compromises can and will happen.
  3. Studies and history have shown that companies that do not adopt a password manager have more breaches than companies that do (due to password reuse). (Source: Verizon Data Breach Report)
  4. Having experienced a breach is definitely a bad thing to happen at LastPass but their transparency about it is a good thing.
  5. LastPass has been independently verified to be following best practices for encrypting your data and salting and hashing your master password.
  6. Security experts have reviewed and verified LastPass does not have access to your encrypted data, master passwords, nor could they gain such access.
  7. CyberHoot stands by the security industry’s recommendation to adopt a password manager for the enhanced security it provides employees.
  8. LastPass has a bug bounty program to encourage white-hat hackers to report security issues responsibly in their products. This is a very good thing.
  9. SolarwindsCiscoMicrosoft, have all had breaches in their products or their corporate network recently. Breaches happen.
  10. HaveIBeenPwned.com reports 11.9 Billion public accounts exposed online. CyberHoot estimates 5 to 15x more accounts are exposed on the dark web.
  11. Even security companies like Carbon Black, and RSA have had their networks breached and IP stolen in the past. Its not a question of if but when. 

Given that breaches will happen at any company, including security focused companies, what should you be looking for in the companies whose software you purchase?

CyberHoot believes you should consider how transparent will each company be when facing a breach situation. LastPass, to their credit has been very transparent about security issues here and in the past.

Should I stop using LastPass?

No. CyberHoot does not see any reason currently to stop using LastPass.  We will continue to monitor and report on this situation as it develops.

CyberHoot ​Recommendations in Light of the LastPass Breach:

The same advice we have always given applies to your companies.  It seems like a tropism to say this, but now, more than ever before you need to get serious about cybersecurity in your organizations and adopt these practices below.
 
  1. ​Always enable MFA to access any Password Manager, including LastPass.
  2. Communicate this incident and your continued support of using a Password Manager to your users.
  3. ​Train your employees on MFA, phishing attacks, password hygiene, ransomware, and more.  Make training a regular occurrence (monthly).
  4. Govern your employees with cybersecurity governance policies including a Password Policy.
  5. Build a risk management framework at your company to assess situations like this, and manage and mitigate risks to your business.
  6. Consider hiring a vCISO to assist you in building out your cybersecurity program and risk resiliency.
​By following these cybersecurity best practices, you can significant reduce risk to your SMB or MSP.
Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.