Freemium password management service exposes 7 million users' data

Synopsis

In July 2015, the password management company revealed that it had been the victim of a cyberattack, compromising email addresses, password reminders, server per user salts and authentication hashes of 7 million users.

According to security commentators, one of the drawbacks of the hashing algorithm PBKDF2-SHA256 employed by the company was that it was not designed to protect passwords. Salts are really not useful for preventing dictionary attacks or brute force attacks.

Book a consultation

Want to discuss this case? You can purchase a 30 minute conference call with our analysts to discuss this case and the implications it has for your organisation. Just select the time and date that works for you:

Companies

  • LastPass

We've done the analysis so you can make the decisions

$489.99
When purchasing a minimum of 5 Case Studies
$699.99 if buying less than 5.

  • Detailed cause & effect analysis
  • Lessons learnt catalogued
  • Preventive controls extracted
Add to Cart
Heads up! Want to try before you buy? You can download our FREE demo case study here