Credential Stuffing Attack on LastPass


Recently, news emerged about a credential stuffing attack on LastPass, a popular password management application used by millions across the globe. Several users of the service had claimed that they had received emails from LastPass about unauthorized log-in attempts using their master passwords. Speculation soon arose about whether there had been a breach of LastPass master passwords, which function as a ‘master key’ for users to unlock the application or its browser extension. Once unlocked with a user’s master password, LastPass simplifies and speeds up logging in to various websites by automatically entering (or saving for later) usernames and passwords on the sites stored in users’ LastPass accounts, as well as two-factor authentication (2FA) codes required by the website or app being visited.   

LastPass Statement About the Purported Breach  

LastPass quickly issued a statement that “…Our initial findings led us to believe that these alerts were triggered in response to attempted “credential stuffing” activity, in which a malicious or bad actor attempts to access user accounts (in this case, LastPass) using email addresses and passwords obtained from third-party breaches related to other unaffiliated services. We quickly worked to investigate this activity and, at this time, have no indication that any LastPass accounts were compromised by an unauthorized third-party as a result of these credential stuffing attempts, nor have we found any indication that user’s LastPass credentials were harvested by malware, rogue browser extensions, or phishing campaigns.” 

It appears that the alerts sent by LastPass to some users were erroneously triggered by an internal error, despite the scare it caused among many of its users. LastPass’s VP of Engineering stated in a blog post that “Our investigation has since found that some of these security alerts, which were sent to a limited subset of LastPass users, were likely triggered in error. As a result, we have adjusted our security alert systems and this issue has since been resolved.”  

[You may also like: Five Benefits of Integrating Bot Management with Your CDN]

LastPass Has Had Breaches in the Past 

Though LastPass has reported breaches in the past, most recently a security vulnerability in its extension for Google Chrome, this does not appear to be another breach. Many internet users practice poor password hygiene and tend to reuse the same passwords across several websites and applications they use. It is very likely that some LastPass users had reused an old password that had been previously breached or leaked as their master password for LastPass as well, despite the service exhorting its users to create a unique master password not used anywhere else.  

Credential Stuffing Attacks With 2FA Phishing Through Bots Pose a Critical Vulnerability 

What this news underscores is that credential stuffing attacks remain amongst the biggest security threats to web users from cybercriminals and hackers who use bots to rapidly and sequentially test previously breached or leaked log-in credentials for nefarious purposes. While many websites and apps now require their users to use 2FA to additionally secure the user log-in process, even 2FA codes can be compromised by a new breed of robo-calling phishing bots as we explained in our blog. Only a specialized bot management solution that can effectively differentiate between humans and bots on a website or app can prevent credential stuffing and phishing attacks in the first place.  

Like this post? Subscribe now to get the latest Radware content in your inbox
weekly plus exclusive access to Radware’s Premium Content

Siddharth Deb

Siddharth is a Senior Content Developer at Radware's Bot Management group. He has worked with over 150 organizations across a diverse range of industries over the past decade and a half, writing research articles, blogs, scripts, white papers, web content and much more. Siddharth has a BBA from UT Arlington, and is a passionate motorcyclist who regularly rides to his favorite destinations.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

CyberPedia

An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

CyberPedia
What is WAF?
What is DDoS?
Bot Detection
ARP Spoofing

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
Events