> This was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled remote code execution capability and allowed the threat actor to implant keylogger malware. The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault.<p>Your corporate vault, with all of your database keys, was stored and accessed from someone's personal computer?<p>> We assisted the DevOps Engineer with hardening the security of their home network and personal resources.<p>And even after this incident, you <i>let them keep using a personal computer</i>???<p>This really just reflects incredibly poorly on LastPass's internal security team. I was under considerably more robust endpoint protection policies as a random intern at a legacy Fortune 500.<p>Edit: I'm quoting from a separate linked blog post here: <a href="https://support.lastpass.com/help/incident-2-additional-details-of-the-attack" rel="nofollow">https://support.lastpass.com/help/incident-2-additional-deta...</a>