LastPass, a popular password manager, has been hit by two data breaches in the past year that compromised the personal data of millions of users. The company recently revealed that a single employee, whose home computer was compromised by keylogging malware, caused both breaches. Although the details of the second breach were recently announced, it turns out that the same employee played a significant role in both incidents.

Recent LastPass Data Breach
LastPass discovered the first breach in August 2022 when the hackers accessed the companyās systems using information obtained from the compromised employeeās computer. The second breach occurred in November of the same year when the hackers used the same employeeās computer to access LastPass systems and steal partially encrypted user login data.
Reports indicate that a keylogger was installed on the personal computer of an individual in a senior engineering position at LastPass via an exploit found in Plex, a service used for personal cloud-based storage and streaming of movies. The keylogger was then used to gain access to corporate-level caches and compromise sensitive user data.

Subsequently, they disclosed that the exploit in question leveraged a vulnerability made public on May 7, 2020. As a result, anyone with access to a server administratorās Plex account could upload a malicious file through the Camera Upload feature and execute it on the media server. For some reason, the LastPass employee failed to update their client to apply the patch released to fix the loophole.
Fix for LastPass Data Breach Issue
LastPass released an updated version of Plex Media Server on the same day to patch the gap. However, the version that addressed the exploit was around 75 versions ago, highlighting the importance of keeping software up-to-date.
LastPass declined to comment on the issue, leaving users concerned about the security practices followed by the company.
In a time when data breach is becoming more frequent, companies need to take proactive measures to safeguard user data. As a user, it is equally important to stay vigilant of potential risks and take necessary steps to protect personal information.
Some valuable tips to Stay Protected from Data Breach
Remember, since your data is already online. We can avoid access or avoid easy access using the tips below.
Create strong and unique passwords for all your online accounts
Consider generating strong and unique passwords for each online account to reduce the risk of compromise. Reusing passwords across multiple accounts increases the risk of all your accounts.
Enable two-factor authentication (2FA) wherever possible
Two-factor authentication (2FA) enhances your security by requiring you to enter a code sent to your phone or email in addition to your password.
Keep your software up-to-date
Software updates often include security patches that fix vulnerabilities that hackers can exploit.
Be cautious of phishing scams
Be careful of phishing scams, fraudulent emails, or messages that deceive you into sharing your personal information. It would be best to be cautious when clicking links or downloading attachments from unknown sources.
Use reputable antivirus software
Antivirus software can detect and remove malware that could compromise your computer and steal your personal information.
FAQs
What happened with LastPass recently?
LastPass experienced two massive data breaches last year, which caused the company to lose its reputation as one of the top password managers.
How did the second data breach happen?
A malevolent actor was responsible for the second data breach, installing a keylogger onto a senior engineerās home computer via an exploit in Plex, a personal cloud service for movie storage and streaming. As a result, the perpetrator could gain access to corporate-level caches.
Did the LastPass employee participate in the second data breach?
The LastPass engineer played a significant role in the security breach. The exploit to access the system took advantage of a vulnerability disclosed on May 7, 2020. Unfortunately, the employee did not update their client to apply the patch, leaving the system vulnerable to attack.
Why didnāt the LastPass employee update their Plex Media Server?
The cause of why the employee did not update their Plex Media Server is currently unknown. According to PCMag, Plex stated that they provide notifications through the admin UI about available updates and will even perform automatic updates in certain situations.
What did LastPass do in response to the data breach?
The attacker took advantage of a vulnerability, which the company confirmedāa vulnerability in a previous version of Plex Media Server that didnāt fix by a patch. A LastPass DevOps engineer owned the computer where this vulnerability was present. LastPass declined to comment on the new information about the engineerās role in the second data breach.
Wrap Up
To sum up, the recent data breach in LastPass is a reminder of cybersecurityās significance. Users must recognize the potential risks and implement measures to safeguard their data. For companies, it is imperative to prioritize security and take proactive steps to protect user data.
Stay safe online, and always remember to be vigilant!
Ask Follow-up Question from this topic With Google Gemini: Single Employee Caused Recent LastPass Data Breach

Selva Ganesh is a Computer Science Engineer, Android Developer, and Tech Enthusiast. As the Chief Editor of this blog, he brings over 10 years of experience in Android development and professional blogging. He has completed multiple courses under the Google News Initiative, enhancing his expertise in digital journalism and content accuracy. Selva also manages Android Infotech, a globally recognized platform known for its practical, solution-focused articles that help users resolve Android-related issues.




Leave a Reply