LastPass-proprietor GoTo (formerly LogMeIn) on Tuesday disclosed that unidentified risk actors had been able to steal encrypted backups of some customers’ info together with an encryption vital for some of these backups in a November 2022 incident.
The breach, which focused a third-celebration cloud storage assistance, impacted Central, Pro, join.me, Hamachi, and RemotelyAnywhere solutions, the corporation said.
“The influenced data, which differs by solution, might include things like account usernames, salted and hashed passwords, a portion of multi-aspect Authentication (MFA) configurations, as properly as some item configurations and licensing info,” GoTo’s Paddy Srinivasan stated.
In addition, MFA options pertaining to a subset of its Rescue and GoToMyPC clients were being impacted, whilst there is no evidence that the encrypted databases associated with the two expert services ended up exfiltrated.
The business did not disclose how lots of users had been impacted, but claimed it can be straight getting in contact with the victims to present further information and facts and suggest sure “actionable ways” to protected their accounts.
GoTo has also taken the action of resetting the passwords of affected customers and requiring them to reauthorize MFA options. It even further explained it’s migrating their accounts to an improved identification administration platform that claims to present far more strong security.
The enterprise application supplier emphasised that it does shop full credit card aspects and that it does not collect personal facts this kind of as dates of birth, addresses, and Social Security numbers.
The announcement arrives virtually two months just after both equally GoTo and LastPass disclosed “unusual action within just a 3rd-party cloud storage services” that’s shared by the two platforms.
LastPass, in December 2022, also unveiled that the digital burglary leveraged info stolen from an previously breach that took place in August and enabled the adversary to steal a massive stash of client details, together with a backup of their encrypted password vaults.
The obtained data was “utilized to concentrate on an additional personnel, acquiring qualifications and keys which ended up applied to access and decrypt some storage volumes inside the cloud-primarily based storage support,” it pointed out.
Identified this short article appealing? Follow us on Twitter and LinkedIn to examine much more distinctive material we article.
Some parts of this article are sourced from:
thehackernews.com