Anatomy of a Breach

Anatomy of a Breach: NHS Advanced and LastPass — A UK Healthcare MSP and a Password Vault Both Compromised

> series: anatomy_of_a_breach —— part: 164 —— targets: nhs_advanced + lastpass —— nhs_111: disrupted —— lastpass: source_code_stolen<span class="cursor-blink">_</span>_

Hedgehog Security 31 August 2022 14 min read

NHS 111 disrupted through a vendor. LastPass source code stolen. The trust infrastructure under attack.

On 4 August 2022, Advanced — a managed service provider whose Adastra platform supports NHS 111, ambulance dispatch, patient referral systems, and out-of-hours GP services — was hit by ransomware. The attack forced Advanced to take its systems offline, disrupting NHS 111 services across England. Callers to 111 experienced delays, and some NHS trusts reverted to paper-based processes for patient referrals and ambulance dispatch. The disruption lasted weeks, and the ICO subsequently investigated.

In the same month, LastPass disclosed that an attacker had compromised a developer's account and accessed portions of the LastPass development environment, stealing source code and proprietary technical information. LastPass stated at the time that no customer vault data had been accessed. But the August intrusion was the precursor to a far more serious breach: in December 2022, LastPass would disclose that the attacker had used information from the August breach to access a cloud storage service containing encrypted customer vault backups — meaning the password vaults of LastPass's millions of users were now in the attacker's possession, protected only by their master passwords.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

NHS 111. Patient referrals. Ambulance dispatch. All disrupted through one vendor.

The Advanced ransomware attack was the latest in a pattern of NHS disruption through cyber incidents: WannaCry (2017, 80 trusts), Irish HSE (2021, Conti), and now Advanced (2022, ransomware via MSP). Each incident confirmed that NHS services are critically dependent on technology — and that technology dependencies create supply chain vulnerabilities.

NHS 111 Disrupted
The 111 non-emergency health line — used by millions of UK residents — was disrupted because its underlying platform (Adastra, provided by Advanced) was taken offline. When your MSP is hit by ransomware, your services go down even though your own systems are not compromised. <a href="https://www.socinabox.co.uk/sectors/gp-surgeries">SOC in a Box for Healthcare</a> monitors vendor-dependent services for disruption.
LastPass: The Vault Heist Begins
The August 2022 LastPass breach — stealing source code — was the first step in what would become the most significant password manager breach in history. The stolen source code and technical knowledge enabled the attacker to identify and access cloud storage containing encrypted vault backups in a subsequent attack. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses developer environment security and separation from production systems.
MSP as Single Point of Failure
Advanced's ransomware attack disrupted NHS services across England — because the MSP was a single point of failure for multiple critical health services. This is the same pattern as <a href="/blog/anatomy-of-a-breach-kaseya-vsa">Kaseya</a> (2021) and <a href="/blog/anatomy-of-a-breach-blackbaud">Blackbaud</a> (2020). <a href="/cyber-essentials">Cyber Essentials</a> addresses MSP dependency risk.
Trust Infrastructure Targeted
Both Advanced (trusted MSP) and LastPass (trusted password manager) were compromised — targeting the infrastructure organisations trust most. When the tools designed to keep you secure are themselves compromised, the security model inverts. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response when trusted infrastructure is compromised.

Your MSP and your password manager are your highest-risk dependencies.

The simultaneous compromise of an NHS MSP and a password manager in the same month underscored that the tools and services organisations depend on most create the greatest supply chain risk when compromised. For UK organisations, Cyber Essentials addresses vendor and supply chain security. Our penetration testing assesses MSP access controls and developer environment security. SOC in a Box provides monitoring independent of any single MSP. And UK Cyber Defence provides incident response when supply chain breaches affect your organisation.


NHS 111 went down because its MSP was ransomwared. LastPass vaults were stolen. Are your critical dependencies tested?

<a href="/penetration-testing">Penetration testing</a> assesses MSP and vendor security. <a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain risk. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors independently.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles