More than 33 million people use the password manager LastPass worldwide, and it recently had a hacker infiltrate its servers and take sensitive data and source code. According to a blog post on Thursday, the business doesn’t think any passwords were obtained as part of the breach, and customers shouldn’t need to take any action to secure their accounts.
An investigation determined that an “unauthorized party” cracked into its developer environment, which is the software that employees use to build and maintain LastPass’s product. The perpetrators were able to gain access through a single compromised developer’s account, the company said.
The attack struck a company that generates and stores hard-to-crack, auto-generated passwords for multiple accounts, like Netflix or Gmail, on behalf of its users — without the need to manually enter credentials. LastPass lists Patagonia, Yelp Inc. and State Farm as customers on its website.
Cybersecurity website Bleeping Computer reported that it had asked LastPass about the breach two weeks ago.
Allan Liska, an analyst on the Computer Security Incident Response Team at cybersecurity company Recorded Future, said he was impressed with the “speedy notification” from LastPass.
“While two weeks might seem like a long time to some, it can take a while for incident response teams to fully assess and report on a situation,” he said. “it will take time to fully determine the extent of any damage that may have been as result of the breach. However, for now it appears to not be client-impacting.”
LastPass didn’t immediately respond to a request for further comment.
There was speculation on social media that hackers may be able to access the keys to password vaults after stealing source code and proprietary information.
“It is unlikely that the stolen source code will give the criminals access to customer passwords,” Liska said.