LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
LastPass's Breach Notice.

Article 1
Archive 1

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen​


1671988313414.png

LastPass hacked
The August 2022 security breach of LastPass may have been more severe than previously disclosed by the company.

The popular password management service on Thursday revealed that malicious actors obtained a trove of personal information belonging to its customers that include their encrypted password vaults by using data siphoned from the earlier break-in.

Also stolen is "basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service," the company said.

The August 2022 incident, which remains a subject of an ongoing investigation, involved the miscreants accessing source code and proprietary technical information from its development environment via a single compromised employee account.

LastPass said this permitted the unidentified attacker to obtain credentials and keys that were subsequently leveraged to extract information from a backup stored in a cloud-based storage service, which it emphasized is physically separate from its production environment.

On top of that, the adversary is said to have copied customer vault data from the encrypted storage service. It's stored in a "proprietary binary format" that contains both unencrypted data, such as website URLs, and fully-encrypted fields like website usernames and passwords, secure notes, and form-filled data.

These fields, the company explained, are protected using 256-bit AES encryption and can be decoded only with a key derived from the users' master password on the users' devices.

LastPass confirmed that the security lapse did not involve access to unencrypted credit card data, as this information was not archived in the cloud storage container.

The company did not divulge how recent the backup was, but warned that the threat actor "may attempt to use brute-force to guess your master password and decrypt the copies of vault data they took," as well as target customers with social engineering and credential stuffing attacks.

It bears noting at this stage that the success of the brute-force attacks to predict the master passwords is inversely proportional to their strength, meaning the easier it is to guess the password, the lesser the number of attempts required to crack it.

"If you reuse your master password and that password was ever compromised, a threat actor may use dumps of compromised credentials that are already available on the internet to attempt to access your account," LastPass cautioned.

The fact that website URLs are in plaintext means that a successful decryption of the master password could give the attackers a sense of the websites a particular user holds accounts with, enabling them to mount additional phishing or credential theft attacks.

The company further said that it notified a small subset of its business customers – which amounts to less than 3% – to take certain unspecified action based on their account configurations.

The development comes days after Okta acknowledged that threat actors gained unauthorized access to its Workforce Identity Cloud (WIC) repositories hosted on GitHub and copied the source code.

Article 2
Archive 2

Hackers stole encrypted LastPass password vaults, and we’re just now hearing about it​

Last month, the company announced that threat actors had accessed “certain elements” of customer info. Just as many US workers are leaving for a holiday break, the company reveals that meant their encrypted passwords.

1671989665107.png

Pictured: the encrypted vault with your passwords.

LastPass has a doozy of an updated announcement about a recent data breach: the company — which promises to keep all your passwords in one, secure place — is now saying that hackers were able to “copy a backup of customer vault data,” meaning they theoretically now have access to all those passwords if they can crack the stolen vaults (via TechCrunch).

If you have an account you use to store passwords and login information on LastPass, or you used to have one and hadn’t deleted it before this fall, your password vault may be in hackers’ hands. Still, the company claims you might be safe if you have a strong master password and its most recent default settings. However, if you have a weak master password or less security, the company says that “as an extra security measure, you should consider minimizing risk by changing passwords of websites you have stored.”

That might mean changing the passwords for every website you trusted LastPass to store.

While LastPass insists passwords are still secured by the account’s master password, it’s hard to just take its word at this point, given how it’s handled these disclosures.

When the company announced it had been breached in August, it said it didn’t believe user data had been accessed. Then, in November, LastPass said it detected an intrusion, which apparently relied on information stolen in the August incident (it would’ve been nice to hear about that possibility sometime between August and November). That intrusion let someone “gain access to certain elements” of customer info. It turns out those “certain elements” were, you know, the most important and secret things that LastPass stores. The company says there’s “no evidence that any unencrypted credit card data was accessed,” but that would likely have been preferable to what the hackers actually got away with. At least it’s easy to cancel a card or two.

A backup of customers’ vaults was copied from cloud storage.

We’ll get to how this all went down in a bit, but here’s what LastPass CEO Karim Toubba is saying about the vaults being taken:

"The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data."

Toubba says the only way a malicious actor would be able to get at that encrypted data, and therefore your passwords, would be with your master password. LastPass says it has never had access to master passwords.

That’s why he says, “it would be extremely difficult to attempt to brute force guess master passwords,” as long as you had a very good master password that you never reused (and as long as there wasn’t some technical flaw in the way LastPass encrypted the data — though the company has made some pretty basic security errors before). But whoever has this data could try to unlock it by guessing random passwords, AKA brute-forcing.

LastPass says that using its recommended defaults should protect you from that kind of attack, but it doesn’t mention any sort of feature that would prevent someone from repeatedly trying to unlock a vault for days, months, or years. There’s also the possibility that people’s master passwords are accessible in other ways — if someone re-uses their master password for other logins, it may have leaked out during other data breaches.

It’s also worth noting that if you have an older account (prior to a newer default setting introduced after 2018 ), a weaker password-strengthening process may have been used to protect your master password. According to LastPass, it currently uses “a stronger-than-typical implementation of 100,100 iterations of the Password-Based Key Derivation Function,” but when a Verge staff member checked their older account using a link the company includes in its blog, it told them their account was set to 5,000 iterations.

Perhaps the more concerning bit is the unencrypted data — given that it includes URLs, it could give hackers an idea of which websites you have accounts with. If they decided to target particular users, that could be powerful information when combined with phishing or other types of attacks.

If I were a LastPass customer, I would not be happy with how the company has disclosed this info

While none of that is great news, it’s all something that could, in theory, happen to any company storing secrets in the cloud. In cybersecurity, the name of the game isn’t having a 100 percent perfect track record; it’s how you react to disasters when they happen.

And this is where LastPass has, in my opinion, absolutely failed.

Remember, it’s making this announcement today, on December 22nd — three days before Christmas, a time when many IT departments will largely be on vacation, and when people aren’t likely to be paying attention to updates from their password manager.

(Also, the announcement doesn’t get to the part about the vaults being copied until five paragraphs in. And while some of the information is bolded, I think it’s fair to expect that such a major announcement would be at the very top.)

LastPass says that the vault backup wasn’t initially compromised in August; instead, its story is that the threat actor used info from that breach to target an employee who had access to a third-party cloud storage service. The vaults were stored in and copied from one of the volumes accessed in that cloud storage, along with backups containing “basic customer account information and related metadata.” That includes things like “company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service,” according to LastPass.

Toubba says the company is taking all sorts of precautions as a result of the initial breach, and the secondary breach that exposed the backups, including adding more logging to detect suspicious activity in the future, rebuilding its development environment, rotating credentials, and more.

That’s all good, and it should do those things. But if I were a LastPass user, I’d be seriously considering moving away from the company at this point, because we’re looking at one of two scenarios here: either the company didn’t know that backups containing users’ vaults were on the cloud storage service when it announced that it had detected unusual activity there on November 30th, or it did know and chose not to tell customers about the possibility that hackers had gotten access to them. Neither of those is a good look.
 
This is why password managers are a joke and you should use a pen and paper to write down one password you use for everything so even if you lose the paper you'll probably remember it.
 
Yeah I was gonna wonder why a password manager has to be online at all? Like I guess a UI makes it a bit more appealing but damn you might as well just have a 'passwords.txt' file hidden away in a random folder in your AppData folder or some random system folder people dont necessarily look in.
 
Yeah I was gonna wonder why a password manager has to be online at all? Like I guess a UI makes it a bit more appealing but damn you might as well just have a 'passwords.txt' file hidden away in a random folder in your AppData folder or some random system folder people dont necessarily look in.
It's online for convenience. Guess how secure convenience is. Not very.
 
Why use a local password manager they said, it's so much less convenient they said.

A lot more convenient than getting all your passwords jacked because you stored them in the massive building with "passwords" written on it and a gigantic target smack in the middle of it though.
 
Can scream KEEPASS at top of lungs, but nobody listens. Just insane to store passwords like this on the cloud.
 
KeePass with a keyfile required to unlock. Store the keyfile on your separate storage device of choice, use a good long pass phrase (I picked a random bit from a book I took off my shelf). Don't lose track of the keyfile.

You can't control all the risks, particularly those you don't know about, but this is pretty "secure". It will keep anyone below a federal agency struggling that's for sure.
 
From the internet and technology thread:

What info hackers have: account metadata, vault metadata (incl URL field) - URLs from vault entries were stored in simple SQLdb. Absolute infosec niggery from LastPass. For example, if you stored your KF credentials in LastPass, they're now associated with your e-mail, partial CC number, other websties you have accounts on (incl. personal/work/business accts) and IP address. Imagine paying money for this shit.
What they don't have: name, password and notes. If encrypted vault has strong master key and LastPass properly implemented the encryption algorithm (which they didn't in the past btw 🤣), this data should be safe.
They can't impersonate you, but they can partially expose you as a horrible KFer
 
Their shitty business model required them to force people to rent, as with so many other businesses, and it's delightful to see this befall them.

I have a few important passwords written down on paper, but I make perhaps one account somewhere per year. I generally login once and keep the cookies around for years. Several of my passwords are long rants about how much I hate having made the account, or a short program; I remember them verbatim years later with no effort, and they're effectively impossible to break conventionally.
 
From the internet and technology thread:


They can't impersonate you, but they can partially expose you as a horrible KFer
I'd add that old vaults are more vulnerable to cracking. Don't know exactly how old the master password needs to be, but at one point LP uesd only 5000 iterations of their AES-256 key derivation function (KDF) instead of 100100. Military-grade encryption btw to improve performance on mobile devices LOL (the more iterations you set when creating the vault, the more hashes your CPU needs to calculate to decrypt it. This slows guessing and dictionary attacks). If only there were machines designed for the sole purpose of calculating SHA hashes...wait, there are and they're called ASIC miners! And since BTC is down to 17K, their hashrate would be cheap to rent.
There's a method to check how many iterations of KDF your LP vault utilizes, but I didn't save the link. So, weak master password+old KDF=ultra pwn3d.
 
KeePass with a keyfile required to unlock. Store the keyfile on your separate storage device of choice, use a good long pass phrase (I picked a random bit from a book I took off my shelf). Don't lose track of the keyfile.

You can't control all the risks, particularly those you don't know about, but this is pretty "secure". It will keep anyone below a federal agency struggling that's for sure.
Excellent way to pick a random passphrase. I've done that before + rolled some dice to pick a random page
 
Excellent way to pick a random passphrase. I've done that before + rolled some dice to pick a random page
>mfw I set a random ass quote as my Bitcoin wallet password in 2014 while drunk out of my fucking skull.
>mfw I can't attach the picture of the face because tor on mobile won't let me upload.
Just Google "wojak depressed" to see what I was going to attach.
 
Yeah I was gonna wonder why a password manager has to be online at all? Like I guess a UI makes it a bit more appealing but damn you might as well just have a 'passwords.txt' file hidden away in a random folder in your AppData folder or some random system folder people dont necessarily look in.
I keep my passwords in a file called passwords.txt on my desktop. Always open.
 
A pad of paper in your drawer is safer than most password services.

Or you could just use: Null@feeder12345 for every site like I do.
 
If you're gonna use a password manager, use something that doesn't sync to the cloud. I've been using KeePass for 15 years. I only sync the database using a USB cable. No cloud.
Never had an issue - I just sat back over the years and watched the online password managers get fucked, one by one.
 
Back
Top Bottom