Reference no: EM133241165
THIS DISCUSSION TOPIC IS ABOUT: "Network Threats and Attacks". PLEASE READ AND RESPOND TO CLASSMATE POST BELOW
VERY IMPORTANT:
1) PICK A KEYPOINT FROM THE POST AND SHARE YOUR KNOWLEDGE, MAKE IT SHORT.
2) ASK QUESTIONS THAT WOULD EXPAND CLASSMATE'S KNOWLEDGE ON HIS POST
3) YOUR CONTRIBUTION HAS TO BE RELATED TO THE CONTENT OF HIS POST
4) PROVIDE REFERENCES TO YOUR POST
CLASSMATE POST
In August 2022, a malicious actor was able to gain access to the LastPass development environment. LastPass is a service which stores passwords and credentials for its users, making any breach of its systems a major issue.
The threat actor was able to access the development environment and exfiltrate data pertaining to the development and testing of the LastPass software. Thankfully, it does not appear that they were able to access the production environment where user data is stored. LastPass stated that the user environment is separated from the development environment so that an actor on one cannot access the other.
The exact means of the compromise are still under investigation. The part I find most interesting is that the threat actor was able to gain access to a system which employed MFA. The purpose of an MFA environment is to reduce the threat that unauthorized persons face to a system. If an authorized user logs into a system on an already compromised device, it could defeat the purpose of MFA.
Network segregation is an important part of securing resources within an environment. In this case LastPass' safeguards were successful in preventing the threat actor from accessing more critical portions of the network because they were separated from the compromised section of the network.
Endpoint security is also a concern, especially for this example. Enforcing security measures on the user device, and educating users, should be a priority going forward.