GoTo Remote Work: Hackers steal backups and keys

B2B Cyber ​​Security ShortNews

Share post

The service provider GoTo for remote work - formerly LogMeIn - reports a hack on customer data and access to encrypted backups including keys that were stored on a cloud server. It probably also contained passwords, names, e-mails and more.

Back in November there was a hacker attack on the cloud section of the online password service LastPass. This is a subsidiary of GoTo, which uses third-party cloud storage. Apparently GoTo data and backups were also accessed there, as the company had to admit almost 2 months later. The first GoTo message in November only mentioned that a security incident was being investigated.

Encrypted backups and keys gone

GoTo had informed its users about the incident briefly and without content, but then probably didn't say anything more. In a recent report, the damage now sounds completely different and much more serious. GoTo now writes about the November 2022 hack: “Our investigation so far has revealed that an attacker exfiltrated encrypted backups from a third-party cloud storage service in connection with the following products: Central, Pro, join.me, Hamachi and RemotelyAnywhere.

We also have evidence that an attacker exfiltrated an encryption key for some of the encrypted backups. Affected information, which varies by product, may include account usernames, salted and hashed passwords, some Multi-Factor Authentication (MFA) settings, and some product settings and license information. Additionally, although the databases encrypted with Rescue and GoToMyPC were not exfiltrated, the MFA settings of a small subset of their customers were affected. At this time, we have no evidence of an exfiltration affecting any GoTo products other than those listed above, or any of GoTo's production systems."

Hack: GoTo customers should be informed directly

The company now wants to inform all affected customers directly, because the reference to the hack and the detailed update can only be found on its website under the succinct heading “Our reaction to a recent security incident”. GoTo further states “While all account passwords have been salted and hashed in accordance with best practices, as a precautionary measure we will also reset affected users' passwords and/or reauthorize MFA settings where appropriate. Additionally, we are migrating their accounts to an advanced identity management platform that provides additional security with more robust authentication and login-based security options.”

Editor/sel

More at GoTo.com

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more