After the LastPass hack, here’s what you need to know.

What’s happened?

Just days before Christmas, when most people probably weren’t paying too much attention, password management service LastPass revealed that hackers had accessed customers’ password vaults.

That sounds really bad. But wasn’t there news of a LastPass hack earlier in the year?

You’re probably thinking of the original announcement LastPass made back on August 25 2022, where it said that a hacker had managed to gain access to a developer’s account, and stolen some of its source code from a development environment.

Back then LastPass said that it had “seen no evidence that this incident involved any access to customer data or encrypted password vaults.”

So they were wrong when they said that?

Well, LastPass might have not seen any evidence that customers’ passwords vaults had been accessed then, but…

But when a company says it has “seen no evidence” of anything bad happening, that’s not necessarily the same as saying “nothing bad happened”?

Correct. And sure enough, just before Christmas, LastPass confirmed that the information stolen from a developer’s account in the August 2022 attack was actually “used to target another employee, obtaining credentials and keys which were used to access and decrypt some storage volumes…”

Gulp! That sounds much worse. So let me get this straight – the theft of the password vaults and other data from LastPass may well have occurred in August or September… long before they announced it as I was distracted wrapping Christmas presents?

Perhaps. LastPass hasn’t said when it believes the theft of the password vaults occurred, but the most important thing to you is probably what the stolen data contained, and how it could be exploited by hackers.

Ok. I’m bracing myself. Tell me the worst…

The stolen data includes the following unencrypted data:

  • company names
  • end user names
  • billing addresses
  • telephone numbers
  • email addresses
  • IP addresses which customers used to access LastPass
  • website URLs from your password vault

In other words, cybercriminals now know that you use LastPass, they know how to contact you, and they know which websites you use.

That’s valuable information for anyone attempting to phish further information from you, as they could easily pose as one of the websites you access and send you a scam email.

Furthermore, simply knowing which websites you access (and store in your password manager) might reveal private information about you that you would have rather remain confidential.

And further still, it’s possible you stored password reset links for these websites in your password manager that might not have expired, or other sensitive information or tokens in your website URLs that you wouldn’t want to fall into the wrong hands.

This sound terrible…

Hang on, I haven’t finished.

Because the hackers also stole encrypted customer data including:

  • website usernames and passwords
  • secure notes
  • form-filled data

But that’s encrypted, right?

Yes, it’s encrypted. The hackers need to determine what your LastPass master password is, to access the crown jewels – the usernames and passwords to all your online accounts.

Well, I have a strong, hard-to-guess, unique password. And I have two-factor authentication (2FA) enabled on my LastPass account. So I’m safe…

Hmm, well… 2FA is irrelevant in this case. The hackers have already stolen the password vault data, they don’t need to bother logging into anyone’s LastPass account.

Similarly, changing your password now doesn’t undo the data breach. It may still be a sensible step to take, of course.

And what’s going to help the hackers is that many many LastPass users are likely to have chosen master passwords that are much weaker than LastPass itself recommends.

Since 2018, LastPass says it has recommended and required a “twelve-character minimum for master passwords”.

Aside from the fact that the number of characters alone isn’t a good indicator of password strength, it appears that customers who have been with LastPass since before 2018 have not been required to update their master passwords to meet LastPass’s own recommendations – leaving the encrypted parts of their password vaults much more vulnerable.

It sounds like LastPass missed an opportunity to boost its users’ security there…

Yes, it does rather.

And what’s more, security researchers have revealed that at least some of the master passwords stored by LastPass for its longer-standing users’ vaults have been encrypted in a way which makes them far too easy to crack.

What do you mean?

As researcher Wladimir Palant details, LastPass salts-and-hashes master passwords using the PBKDF2 algorithm, with 100,100 iterations.

The number of “iterations” is an indication of just how much “work” someone (or more likely a modern graphics card) is going to have to do to break your password.

However, many LastPass users who have had their accounts for a long time appear to have only had their accounts configured for 5000 iterations, or in some cases as low as 500, or even one!

Such poorly-secured vaults may not take too long (or cost too much money) to unlock.

Snippet from Wladimir Palant’s blog post.

And, as LastPass rival 1Password explains, the figures become much worse when it is a human-created password that the hackers are trying to crack rather than a truly randomly-generated one.

Oh, by the way, OWASP’s 2021 guidance is for… err… 310,000 or more iterations…

Years ago, shouldn’t LastPass have contacted those customers who had a low number of iterations, and forced them to boost their security?

You would think that would have been a good idea, right? Years have gone past, modern graphics cards have got faster at cracking passwords, LastPass failed to better protect its most loyal customers.

You won’t find any mention of the data breach on the homepage of LastPass.com either. Which also seems like a missed opportunity – even if it’s closing the stable door after the horse has bolted…

Blimey. Ok, let’s cut to the chase. Is my LastPass password vault at risk?

Perhaps.

I would say your LastPass password vault is more at risk if a hacker is prepared to put the resources into cracking your master password. For instance, if you are…

  • one of the 100,000 businesses worldwide that uses LastPass
  • a journalist
  • a government worker or politician
  • a human rights defender
  • a celebrity
  • a cryptocurrency investor
  • “a person of interest” to an authoritarian regime

I’m not one of those. I’m just Joe Schmoe. Could the passwords I store in my LastPass vault still be accessed?

Perhaps. Especially if your password isn’t as strong as it should be, or if you’ve reused your master password elsewhere on the net, or if you’re likely to be phished, or if LastPass was not using enough iterations to make it harder to be cracked.

So what should I do?

The sensible thing to do would be to assume that your passwords have been, or could be, compromised.

In which case you should change your passwords. And not just your LastPass master password – *all* the passwords stored in your LastPass vault.

Sheesh. That’s going to be a lot of effort

I hear you. I have over 1600 unique passwords in my password vault (I’m not using LastPass, thank goodness), as well as other documents that I would like to remain secured.

Should I ditch LastPass?

That’s something only you can decide.

I feel bad because LastPass is a product that I have recommended to users in the past (they used to sponsor this website back in 2020, and between 2018-2020 sponsored the “Smashing Security” podcast I co-host).

I’ve always been a big fan of password managers (1Password has also been a sponsor of this blog and the podcast, and Bitwarden currently sponsors “Smashing Security”).

I continue to believe that using a password manager – just about any password manager – is better than not using a password manager.

But I can’t bring myself to recommend LastPass now. There are better choices out there.

Original Article: https://grahamcluley.com/lostpass-after-the-lastpass-hack-heres-what-you-need-to-know/