LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack

Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.

That’s the official word from LastPass in response to public reports that some users received blocked access emails warnings that are normally sent to users who log in from different devices and locations.

The email notifications raised fears of a data compromise at the LogMeIn-owned startup that claims more than 30 million users and 85,000 business customers worldwide. However, in a note credited to VP of Engineering Gabor Angyal, LastPass downplayed the severity of the issue and said the warnings were linked to known credential-stuffing attacks.

[ READ: Why Are Users Ignoring Multi-Factor Authentication? ]

Here’s the LastPass explanation:

We recently investigated reports of an uptick of users receiving blocked access emails, normally sent to users who log in from different devices and locations.

Our initial findings led us to believe that these alerts were triggered in response to attempted “credential stuffing” activity, in which a malicious or bad actor attempts to access user accounts (in this case, LastPass) using email addresses and passwords obtained from third-party breaches related to other unaffiliated services. 

We quickly worked to investigate this activity and, at this time, have no indication that any LastPass accounts were compromised by an unauthorized third-party as a result of these credential stuffing attempts, nor have we found any indication that user’s LastPass credentials were harvested by malware, rogue browser extensions, or phishing campaigns.

Angyal admitted that some of the security alerts were sent by LastPass in error but he did not elaborate on the scale of the problem or the errors that caused users to post nervous social media posts flagging the issue.

“Our investigation has since found that some of these security alerts, which were sent to a limited subset of LastPass users, were likely triggered in error. As a result, we have adjusted our security alert systems and this issue has since been resolved,” Angyal said.

The LastPass VP urged customers to use a strong Master Password and never re-use that password for any other website or app.  In response to the ongoing credential-stuffing attacks, Angyal is recommending that users immediately change LastPass Master Passwords and enable multi-factor authentication on all accounts.

Related: LastPass Patches Bug Leaking Last-Used Credentials 

Related: Overall Security of Password Managers Debatable

Related: Flaws Allowed Hackers to Bypass LastPass 2FA

Related: LastPass Flaws Allow Hackers to Steal Passwords

view counter

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a journalist and cybersecurity strategist with more than 20 years experience covering IT security and technology trends.
Ryan has built security engagement programs at major global brands, including Intel Corp., Bishop Fox and Kaspersky GReAT. He is a co-founder of Threatpost and the global SAS conference series. Ryan’s career as a journalist includes bylines at major technology publications including Ziff Davis eWEEK, CBS Interactive’s ZDNet, PCMag and PC World.
Ryan is a director of the Security Tinkerers non-profit, and a regular speaker at security conferences around the world.
Follow Ryan on Twitter @ryanaraine.

Previous Columns by Ryan Naraine:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *