Itzuli BlogeraTeknikoa

What the LastPass urraketa Should Have Taught Every...

LastPass encrypted their users' data. The vaults were still exfiltrated. 600K+ Okta erregistroak followed.

March 17, 20268 min irakurri
LastPass breach lessonsSaaS vendor securitycloud vendor riskenterprise securityzero-knowledge architecture

The urraketa That Changed enpresen hodeia seguritatea Assumptions

The LastPass urraketa of 2022 is not primarily a story about pasahitza managers. IT is a story about what happens when enterprises fidantza hodeia vendors with their most datu sentikorrak and that fidantza is violated — not through recklessness but through inplementazioa weaknesses that were invisible from the outside.

LastPass marketed zero-ezagutza architecture. The architecture was not zero-ezagutza in practice. 25 million users had their encrypted vaults exfiltrated. The urraketa was first disclosed in August 2022 and updated multiple times through late 2022 as the scope expanded.

For enterprises in osasun-arriskua, finance, and legala services — sectors where data exposure creates erregetaleak ardura — the LastPass urraketa was not an isolated gertakaria to watch from a distance. IT was a preview of a systemic problem.

The inplementazioa Details That Mattered

Post-urraketa analisia revealed two critical inplementazioa weaknesses:

Iteration count deficiency: LastPass used PBKDF2 for key derivation. For newer accounts, they used 100,100 iterations — below the industry recommendation of 600,000. For older accounts (pre-2018 in some cases), the iteration count was as low as 1 iteration. Lower iteration counts make brute-force attacks on the encrypted vaults computationally feasible. erasoaleak who obtained vaults could systematically attempt to crack master passwords.

Metadata exposure: While vault contents were encrypted, metadata was not. URLs stored in the pasahitza manager, usernames, and zerbitzua names were visible in the exfiltrated data. erasoaleak could identify which services users had accounts with, enabling targeted phishing and credential stuffing even without cracking the vault zifraketa.

For procurement teams evaluating hodeia seguritatea vendors, the LastPass case demonstrates that two questions must be answered separately: "Is the architecture zero-ezagutza?" and "Is the inplementazioa correct?"

The Okta urraketa: The Same Month, A Different Mechanism

In October 2023, Okta disclosed that a mehatxu actor had used a stolen credential to sarbidea Okta's bezeroa support sistema. The urraketa exposed 600,000+ bezeroa support erregistroak, including files uploaded by customers during support interactions.

Okta is an identitatea seguritatea plataforma. The urraketa was not a fundamental architecture failure — IT was a supply chain sarbidea control failure. A support injenitero's credential was compromised, and the erasoa egilea used legitimate sarbidea to reach datu sentikorrak.

The combination of LastPass and Okta illustrates the two failure modes enpresen hodeia vendors face:

  • Architecture failures: zero-ezagutza claims not genuinely implemented
  • sarbidea control failures: legitimate credentials leading to unauthorized data sarbidea

zero-ezagutza architecture addresses the first failure mode. IT does not protect against a determined erasoa egilea who obtains legitimate credentials for saltzailea support systems. But IT does ensure that even such an erasoa egilea cannot sarbidea bezeroa plaintext — because the saltzailea's support systems never have sarbidea to decryptable data.

SaaS seguritatea Incidents Increased 300% from 2022 to 2024

The AppOmni and hodeia seguritatea Alliance research tracking SaaS urraketa incidents from 2022 to 2024 found a 300% increase in seguritatea incidents affecting SaaS platforms during this period.

The 300% figure does not represent a 300% increase in erasoa egilea sophistication. IT represents the growth of SaaS adoption combined with erasoa egilea adaptation: as more enpresen data moved to hodeia platforms, erasoaleak shifted resources to target those platforms. The ROI of compromising a SaaS saltzailea — gaining sarbidea to data from dozens or hundreds of enpresen customers simultaneously — is substantially higher than targeting individual enterprises.

For enterprises that built their saltzailea seguritatea ebaluazioa processes around the assumption that hodeia vendors are secure targets, the 2022-2024 data requires a recalibration. The assumption is wrong. SaaS vendors are priority targets.

The auditoria Checklist After LastPass

For enterprises re-evaluating hodeia saltzailea seguritatea following the LastPass and Okta incidents, a practical checklist:

zifraketa inplementazioa:

  • Request the key derivation algoritmoa, iteration count, and memoria parameters
  • Confirm that iteration counts meet current OWASP recommendations (600,000 PBKDF2-SHA256 minimum, or equivalent Argon2id parameters)
  • Verify that key derivation occurs kliente-side, not on saltzailea servers

Metadata babesa:

  • Ask specifically what metadata is stored in plaintext alongside encrypted content
  • Request the data model showing which fields are encrypted and which are accessible in urraketa scenarios

Support sistema sarbidea controls:

  • Request documentation on support injenitero sarbidea to bezeroa data
  • Confirm that support systems cannot sarbidea bezeroa plaintext data

urraketa notification history:

  • Request disclosure of all previous seguritatea incidents, including those not reaching publikoa disclosure thresholds
  • Evaluate the transparency and completeness of prior disclosures

The LastPass urraketa was partly a failure of inplementazioa and partly a failure of transparency about the inplementazioa. Enterprises that ask detailed questions before saltzailea selection receive answers that baimena informed arriskua assessment. Enterprises that accept high-level claims — "we encrypt your data" — inherit the arriskua of discovering inplementazioa details after a urraketa.

Sources:

Prest zure datuak babesteko?

Hasi PII anonimizatzen 285+ entitate mota 48 hizkuntzatan.