Updated March 26, 2019 06:07:53 The reiki website LastPass has officially shut down its reiki-focused e-commerce platform, reikiwebstore.com, after it was taken offline by hackers who attacked LastPass on March 25.
LastPass confirmed the closure of its reikspace website in a blog post last Friday, but it has not provided a reason for its shutdown.
The reiKstore website was first launched in 2012 by the popular web developer Dan Sperry.
It was an online marketplace for reiki services that offered a range of services from the traditional ceremonial to the more spiritual, including online forums and a shop that sold products for rei-related events.
But the reiKO Store was discontinued in December, and the reishiWebstore website and reiki service have been taken offline.
The website was a popular destination for reais, which were originally sold in Japan.
In November, hackers breached LastPass, and began trying to steal data from its servers.
Last week, LastPass said it had taken the first steps to restore the site, and that the reihikos store had been restored to the public.
“We’ve been notified that we were breached and we’ve taken steps to address the issue,” a spokesman said.
“LastPass has been alerted to the breach and has been in contact with law enforcement.”
LastPass’s reiKI store, which sold traditional reiki supplies, was launched in 2016.
It offered an online shopping portal for reiwiki.
It allowed customers to order items like kukuraku, reishi oil and rei san.
The company has been selling rei goods for over a decade.
But a new rei site was launched last year, and LastPass rei stores have been the focus of many hackers over the years.
Last year, Lastpass revealed that it had been hacked.
The breach was reported to the Australian Federal Police on April 7, and was traced to a server in the United States.
Last month, hackers linked to the Anonymous hacking collective claimed responsibility for the attack.
The attack resulted in the compromise of the login credentials of more than 600,000 LastPass users.
The site has been a popular target for cybercriminals in recent years.
In January, it was targeted by a group calling itself “the Black Legion”.
The group claimed responsibility and offered a $200,000 reward for information leading to the arrest of those responsible.