![]() Our investigation determined that the threat actor gained access to the Development environment using a developer’s compromised endpoint. We can also confirm that there is no evidence that this incident involved any access to customer data or encrypted password vaults". ![]() There is no evidence of any threat actor activity beyond the established timeline. During this timeframe, the LastPass security team detected the threat actor’s activity and then contained the incident. Our investigation revealed that the threat actor's activity was limited to a four-day period in August 2022. In an update to the blog post from the end of August, LastPass CEO Karim Toubba says: " We have completed the investigation and forensics process in partnership with Mandiant.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |