![]() “In addition, while Rescue and GoToMyPC encrypted databases were not exfiltrated, MFA settings of a small subset of their customers were impacted.”ĭespite the delay, GoTo provided no remediation guidance or advice for affected customers. “The affected information, which varies by product, may include account usernames, salted and hashed passwords, a portion of multi-factor authentication (MFA) settings, as well as some product settings and licensing information,” said GoTo CEO Paddy Srinivasan. GoTo said the intruders exfiltrated customers’ encrypted backups from these services - as well as the company’s encryption key for securing the data. Now, almost two months later, GoTo said in an updated statement that the cyberattack impacted several of its products, including business communications tool Central online meetings service hosted VPN service Hamachi, and its Remotely Anywhere remote access tool. GoTo, which bought LastPass in 2015, said at the time that it was investigating the incident. The attackers used information stolen from an earlier breach of LastPass systems in August to further compromise the companies’ shared cloud data. ![]() ![]() At the time, LastPass chief executive Karim Toubba said an “unauthorized party” had gained access to some customers’ information stored in a third-party cloud service shared by LastPass and GoTo. The breach was first confirmed by LastPass on November 30. LastPass’ parent company GoTo - formerly LogMeIn - has confirmed that cybercriminals stole customers’ encrypted backups during a recent breach of its systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |