


He said the investigation has shown no evidence of any unauthorized access to encrypted vault data or customer data in the LastPass production environment. “We never store or have knowledge of your Master Password,” Toubba said, noting that LastPass uses Zero Knowledge architecture that ensures the company can never know or gain access to a customer’s Master Password. Most importantly, LastPass insists that the incident did not compromise Master Passwords that manage access to encrypted vaults in its flagship password manager software. Toubba said the company is evaluating further mitigation techniques to strengthen its environment. While our investigation is ongoing, we have achieved a state of containment, implemented additional enhanced security measures, and see no further evidence of unauthorized activity. In response to the incident, we have deployed containment and mitigation measures, and engaged a leading cybersecurity and forensics firm. Our products and services are operating normally. We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. LastPass chief executive Karim Toubba said the company’s security team detected unusual activity within portions of the LastPass development environment two weeks ago and launched an investigation that confirmed the source code theft. The company, which is owned by GoTo (formerly LogMeIn), disclosed the breach in an online notice posted Thursday but insisted that the customer master passwords or any encrypted password vault data were not compromised. Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.
