The GoTo distant work device software program platform has confirmed that encrypted backups for a number of of its instruments, together with Central, Professional, be a part of.me, Hamachi, and RemotelyAnywhere, have been exfiltrated, together with some encryption keys, in final November’s compromise of the LastPass cloud-based password keeper.
The compromised GoTo information might embody usernames, salted and hashed passwords, some multifactor authentication (MFA) settings, product settings, and licensing data, in line with the corporate’s latest disclosure.
Impacted prospects shall be contacted by GoTo immediately, and all affected customers could have their passwords and MFA settings reset, in line with a publish from GoTo CEO Paddy Srinivasan, which included particulars on the breach.
“As well as, we’re migrating their accounts onto an enhanced identification administration platform, which can present further safety with extra sturdy authentication and login-based safety choices,” Srinivasan added.
Final December, LastPass confirmed the theft of buyer information — a follow-on cyberattack from the earlier August, when the LastPass supply code was stolen.