Feds Connect $150M Cyber Heist to 2022 LastPass Breaches – Krebs on Security

In September 2023, KrebsOnSecurity revealed that security analysts had linked a series of six-figure cyberheists affecting numerous victims to the compromise of master passwords from the password management service LastPass, which suffered a breach in 2022. This conclusion has now been reiterated by U.S. federal agents investigating a significant $150 million cryptocurrency theft. In a recent court filing, these agents revealed they believe the same vulnerabilities exploited in the LastPass incident played a critical role in facilitating this high-profile heist.

On March 6, federal prosecutors in Northern California reported the seizure of approximately $24 million in cryptocurrencies that were traced back to the January 30, 2024, theft. While the court documentation refers to the victim simply as “Victim-1,” blockchain security expert ZachXBT has identified them as Chris Larsen, co-founder of the cryptocurrency platform Ripple. ZachXBT was the first to break the news of this significant heist, noting that law enforcement froze roughly $24 million before the stolen assets could be withdrawn.

The seizure document reveals critical insights: both the U.S. Secret Service and the FBI align with the findings from the earlier LastPass breach investigation, suggesting a direct connection between this cyber incident and other crypto thefts. Investigators indicated that stolen data from various victims’ online password managers had been used to unauthorizedly access their accounts, leading to the theft of sensitive information and cryptocurrencies. This raises alarms regarding the security of online password management systems and the vulnerabilities that persist post-breach.

Detailed analysis by researchers Nick Bax and Taylor Monahan pointed out that none of the victims of the six-figure cyberheists appeared to have suffered from typical prelude attacks in high-value crypto thefts, such as email or mobile account compromises. Instead, all victims shared the commonality of having stored their cryptocurrency seed phrases—essential codes that grant access to crypto holdings—within the “Secure Notes” section of their LastPass accounts before the breaches occurred.

Further investigation uncovered that the pattern of the cyberattacks followed a distinctive modus operandi: rapidly diverting the stolen cryptocurrencies to numerous drop accounts across various exchanges. Law enforcement highlighted that the complexity involved in the $150 million heist suggested the participation of multiple malicious actors, linking this operation back to the vulnerabilities exploited during the LastPass breach, as well as previous attacks on similarly situated victims.

Regarding LastPass’s position, representatives stated that no conclusive evidence has been presented by federal investigators that ties the reported cyberheists directly to their breach. The company has emphasized its commitment to enhancing security measures following the incident disclosed in 2022, where unusual activity and subsequent breaches allowed hackers to access customer vaults, compromising encryption and user data.

This ongoing investigation underscores critical security implications for businesses utilizing password management services. The MITRE ATT&CK framework provides a relevant lens through which to view these tactics, with potential techniques involved in this landscape including initial access through compromised credentials, persistence via the use of legitimate data for unauthorized access, and exploitation of existing vulnerabilities.

Experts point out that the inability of LastPass to alert its customers about the risks associated with information stored in “Secure Notes” has been a significant oversight. The lapse of two and a half years since the initial breach, coupled with substantial financial losses suffered globally, highlights the pressing need for cybersecurity solutions that proactively engage users in securing their sensitive data.

The current landscape illustrates that the attackers have adapted and leveraged the vulnerabilities associated with password management systems. This serves as a notable reminder for businesses about the importance of maintaining robust security protocols, actively managing credentials, and staying informed regarding potential threats recurrent in the cybersecurity realm.

Source link