RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Dev & DevSecOpsMarch 2, 2023

The Week in Security: LastPass shares disturbing breach details, CISA calls for software maker liability

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Security: LastPass shares disturbing breach details, CISA calls for software maker liability

This week: New details expose that the recent hack on LastPass was worse than previously thought. Also: CISA has called for software makers who develop insecure software to be held liable.

This Week’s Top Story

LastPass breach worse than previously thought

LastPass, a password management company, had a rough ending to 2022. Reason being, the company suffered a hack in August of last year, sharing that attackers had accessed LastPass’s development environment, taking portions of their source code and proprietary technical information. New details were then shared by the company in December of 2022 that hackers also stole vault data containing encrypted and unencrypted data from the company, including customer information.

Now, ZDNet has shared the latest development on the LastPass breach, showing that it was more detrimental than previously thought. In a recent statement, the company said that hackers have used information stolen in the August 2022 attack, as well as other breaches and exploitations, to launch a second attack on LastPass. This new attack targeted a senior DevOps engineer at the company by compromising their home computer. This specific engineer had the required high-level authentication necessary to use the decryption keys required to access the company’s cloud storage service.

According to ZDNet, the exact details of LastPass’s latest attack are not certain. However, the company did share that the engineer’s computer was attacked as a result of “a vulnerable third-party media software package.” This then allowed the attackers to install keylogger malware onto the engineer’s computer, which gave the hackers access to whatever the employee typed on their machine. By doing this, the attackers were able to steal the master password to gain access to LastPass’s corporate vault, “which contained encrypted secure notes with access and decryption keys needed to access the AWS S3 LastPass production backups, other cloud-based storage resources, and some related critical database backups," according to the company.

LastPass is now taking several security measures to handle the latest attack, and is urging both business administration users and general customers to change their master passwords.

[ See a roundup of response to the LastPass revelations in this week's Secure Software Blogwatch ]

News Roundup

Here are the stories we’re paying attention to this week…

CISA Director says companies should be made liable for insecure software products (The Washington Post)

Congress should advance legislation allowing software manufacturers to be held legally liable for the insecurity of their products, and it should also shield companies that develop secure software from legal liability, Cybersecurity and Infrastructure Security Agency Director Jen Easterly said this week.

'Major' data breach reported by U.S. Marshals Service, with sensitive data being potentially exposed (USA Today)

Agency spokesman Drew Wade said the incident targeting a "stand-alone" system was discovered Feb. 17, prompting officials to "disconnect" its operation while launching an investigation into what authorities described as a "major incident."

Hackers claim they breached T-Mobile more than 100 times in 2022 (Krebs on Security)

Three different cybercriminal groups claimed access to internal networks at T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then convert that access into a cybercrime service that could be hired to divert any T-Mobile user’s text messages and phone calls to another device.

Why software teams should care about Biden's 2021 cybersecurity act in 2023 (CPO Magazine)

Dotan Nahum of Check Point Software Technologies argues that while it’s been two years since its enactment, it’s important to remind companies why President Biden's 2021 Executive Order on Improving the Nation's Cybersecurity is critical to follow.

Cybercriminals targeting law firms with GootLoader and FakeUpdates malware (The Hacker News)

Six different law firms were targeted in January and February 2023 as part of two disparate threat campaigns distributing GootLoader and FakeUpdates (aka SocGholish) malware strains.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Dev & DevSecOps

More Blog Posts

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / Twitter
LinkedInLinkedIn
FacebookFacebook
InstagramInstagram
YouTubeYouTube
blueskyBluesky
RSSRSS
Back to Top
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Menu

Lab offers 9 ways to improve MCP security

The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.

Learn More about Lab offers 9 ways to improve MCP security
Lab offers 9 ways to improve MCP security

How AI coding is breathing new life into Rust 

AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.

Learn More about How AI coding is breathing new life into Rust 
How AI coding is breathing new life into Rust 

Anthropic’s PSF investment: Why it matters

Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.

Learn More about Anthropic’s PSF investment: Why it matters
Anthropic’s PSF investment: Why it matters
Request a demo
Software quality crisis

Software quality's decline: How AI accelerates it

Development is in freefall toward software entropy and insecurity. Can spec-driven development help?

Learn More about Software quality's decline: How AI accelerates it
Software quality's decline: How AI accelerates it
MCP security robot
AI coding new life for Rust
Open-source software (OSS)