Last week, GoTo (the mother or father firm of LastCross, which has been the sufferer of some current horrendous safety breaches itself) introduced it had additionally been hacked.
Here’s a part of what GoTo stated:
Our investigation so far has decided {that a} menace actor exfiltrated encrypted backups from a third-party cloud storage service associated to the next merchandise: Central, Pro, be a part of.me, Hamachi, and RemotelyAnywhere.
Urk. That’s unhealthy. Losing backups is arguably as unhealthy as shedding your password vaults. But hey, good to know the backups had been encrypted…
We even have proof {that a} menace actor exfiltrated an encryption key for a portion of the encrypted backups.
Oh. So once you stated the backups had been encrypted, you really meant that they had been encrypted however they could possibly be unencrypted with ease?
To say the backups had been encrypted is a bit like attempting to argue {that a} locked field is locked, if the important thing to the locked field is stolen concurrently the field.
The affected data, which varies by product, might embody account usernames, salted and hashed passwords, a portion of Multi-Factor Authentication (MFA) settings, in addition to some product settings and licensing data. In addition, whereas Rescue and GoToMyPC encrypted databases weren’t exfiltrated, MFA settings of a small subset of their clients had been impacted.
GoTo has apparently been forcing password resets on affected accounts and reauthorising MFA settings “out of an abundance of caution.”
Apparently the breach occurred at a third-party cloud storage service, which GoTo and the beleagured LastCross each use.
Although, little question, there can be questions as as to whether GoTo had adequately configured the safety of the cloud-based storage for its backups, there are maybe much more inquiries to ask relating to how cautious it was being with the encryption key for these backups.
Found this text attention-grabbing? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we submit.