LioydJour

LioydJour t1_jaekbgg wrote

The key logger was on the employee’s personal non work issued computer. Not their work station. What location it happened in is irrelevant here because you can work remotely and the expectation is your work device is just as secure as it would be on site. Nothing happened on their workstation.

They gained access to the employees master password when the employee was using their personal device and that gave them access to the employees corporate vault. That’s where it’s odd because why would they allow their employees to share their personal and work vaults. Don’t quite yet understand that link. They should be two separate accounts and two different vaults.

5

LioydJour t1_jaeeudy wrote

It was their personal computer. Not their work workstation

> The attackers exploited a remote code execution vulnerability in a third-party media software package and planted keylogger malware on the employee’s personal computer. “The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault,” the company said.

Problem here seems to be their personal master password being similar to their work one. Unless their personal vault also includes their work one which seems like a gigantic issue

11