LastPass hacked for the second time this year, customer data stolen by hacker

asset_upload_file39648_234597.png

If you use LastPass as a secure password-managing service, things might not be as secure as you think. Earlier this year in August, the password keeper disclosed that it had been breached, with an unknown hacker having gained access to LastPass' source code and proprietary data. At the time, the company stressed that despite this, customers were unaffected by the hack, and that their data was safe. Now, for the second time this year, LastPass is having to announce that they have been hacked for a second time this year, and that in this incident, customer data has indeed been accessed and stolen.

According to an internal investigation, that same hacker used the data (cloud storage access and dual storage container decryption keys from August in order to get ahold of a backup of LastPass customer data. This means that the individual was able to access billing addresses, telephone numbers, IP addresses, and email addresses saved to users' accounts. That isn't the end of the breach, though, because the hacker also copied a backup of vault data, which contains the most sensitive info; usernames, passwords, and saved form-field data. LastPass claims that no credit card data was accessed, as the service does not store complete credit card numbers and information.

While the information like email addresses and telephone numbers were not encrypted, the password vaults were, with a 256-bit AES encryption, requiring a special key in the form of a user's master password to access. So despite having this information, LastPass claims that this would make it incredibly difficult for the hacker to actually obtain the data from the customer vault. That being said, there is the potential for someone to either brute force the master password, or eventually decrypt the data.

The threat actor may also target customers with phishing attacks, credential stuffing, or other brute force attacks against online accounts associated with your LastPass vault. In order to protect yourself against social engineering or phishing attacks, it is important to know that LastPass will never call, email, or text you and ask you to click on a link to verify your personal information. Other than when signing into your vault from a LastPass client, LastPass will never ask you for your master password.

With all this in mind, LastPass says that there isn't a need to take action at this time, unless your master password was not as secure as recommended. This is just the latest in a string of numerous hacks that the password managing service has suffered over the past few years, with incidents taking place in 2015, 2017, and 2019, all resulting in customer data being accessed by hackers.

:arrow: Source
 

The Real Jdbye

*is birb*
Member
Joined
Mar 17, 2010
Messages
23,296
Trophies
4
Location
Space
XP
13,861
Country
Norway
Tech tip: Never store your passwords on your device. Someone could remotely access your PC and steal your passwords.
Not if they're encrypted.
I put my database on a USB stick so I can use it on my laptop as well, guess it does that too

Tech tip
If you keep that USB stick plugged in it's no different from having the file stored on your PC.
 

kisamesama

Well-Known Member
Member
Joined
Sep 29, 2008
Messages
564
Trophies
1
XP
1,445
Country
United States
Maybe storing your passwords outside your home or other secure place that you have exclusive physical access to was never a good idea.
Post automatically merged:


I would recommend an encrypted USB drive as unlike a smartphone, it can't get hacked while it's disconnected and unlike a notepad, people going through your belongings can't read it.
I see. It is sure less convenient. I will probably self host a password manager
The important distinction here is "self-hosted" which LastPass is not.
if they can hack lastpass, they can hack your self hosted bitwarden; probably easier.
 

RAHelllord

Literally the wurst.
Member
Joined
Jul 1, 2018
Messages
714
Trophies
1
XP
2,756
Country
Germany
if they can hack lastpass, they can hack your self hosted bitwarden; probably easier.
I don't use bitwarden, but it's also less likely a self-hosted version is as easily discovered as knowing where an online service keeps it. Attacking a large service like lastpass is also just more plain attractive because the hacker would be able to potentially gain access to millions of credentials from millions of people, some of which likely have used the master password more than once, or are able to be phished. With a self-hosted service the usable data set will be much lower, thus worth less, thus they will spend less effort on getting in.
 

Jayro

MediCat USB Dev
Developer
Joined
Jul 23, 2012
Messages
12,983
Trophies
4
Location
WA State
Website
ko-fi.com
XP
17,023
Country
United States
What does that process look like for you? Bitwarden has autofill on mobile, so when I click on a password field, the autofill button shows up on top of the keyboard. Tapping that takes a fraction of a second.
I never said I used that method, but it would be easy to plug in a USB stick, open ES File Explorer Pro, and open the text file to copy and paste my password. Mere seconds. Sure it's slower, but not cumbersome by any means.
Post automatically merged:

that's why i stick to my method for storing passwords and it works and is 100% hack proof: a usb stick that's never connected to the computer all the time :creep:
Even better: a USB stick programmed to type your password upon insertion. I made one as a backup for my significant other to access my devices whenever I die.
 

ZeroFX

why?
Member
Joined
Jun 18, 2018
Messages
1,105
Trophies
1
Location
napaJ
XP
2,988
Country
Japan
Your brain is a nice place for password storage (provide you aren't brain damaged), better than services like last pass at least, and yes you can store big, secure, and different passwords there just come up with a pattern. But if you want to store passwords somewhere, do it encrypted, locally, with local backups.
 
Last edited by ZeroFX,

RedColoredStars

Well-Known Member
Member
Joined
Aug 14, 2022
Messages
938
Trophies
0
Location
Vancouver
XP
1,257
Country
Canada
Hahahahahahahahahahahah.

I love it. Last Pass, KeyPass and crap like that are snake oil.

And their clients are idiots for falling in the "secure" motto.

Hahahahahahahahahahahah.

Hahahahahahahahahahahah.

So you didn't read the entire story.

Hahahahahahahahahahahah.

LastPass is still more secure than storing your passwords in a notebook or digitally unencrypted. A person would have to be a complete idiot to use a password manager but still use passwords like abc123 instead of randomly generated and heavily encrypted ones. Sure, user data was stolen. Good luck decrypting the passwords themselves. And for the record, your passwords are already stored online without using a password manager. Every site you log in to has your password stored and any other info you've given them. Any site you belong to could at any point in time be hacked and your info stolen. And it's likely that even after the hack, peoples LastPass passwords still have heavier encryption then most websites are storing peoples password/data with.
 
  • Haha
Reactions: ZeroFX

AlexMCS

Human
Member
Joined
Jul 3, 2018
Messages
627
Trophies
0
Age
38
Location
Fortaleza
XP
2,864
Country
Brazil
There's some controversy about ES File Explorer. Even though it's delisted I still like using it on my Android devices, I guess you could say because of nostalgia and the UI is my favorite (I tried various file explorers and always went back to ESFE Pro).

It's the only Android file explorer I use. It's really the best.

As for security, unless you make your own encryption on top of a secure one, get ready to get cracked some day.
I'd recommend a XOR-based encryption with a variable input value based on a custom function.
 

Jayro

MediCat USB Dev
Developer
Joined
Jul 23, 2012
Messages
12,983
Trophies
4
Location
WA State
Website
ko-fi.com
XP
17,023
Country
United States
He's afraid of features.
Post automatically merged:

There's some controversy about ES File Explorer. Even though it's delisted I still like using it on my Android devices, I guess you could say because of nostalgia and the UI is my favorite (I tried various file explorers and always went back to ESFE Pro).
Same, the new one sucks. I use the good one.

Screenshot_20221223_135107_ES File Explorer Pro.jpg
 

eyeliner

Has an itch needing to be scratched.
Member
Joined
Feb 17, 2006
Messages
2,891
Trophies
2
Age
44
XP
5,538
Country
Portugal
Hahahahahahahahahahahah.

So you didn't read the entire story.

Hahahahahahahahahahahah.

LastPass is still more secure than storing your passwords in a notebook or digitally unencrypted. A person would have to be a complete idiot to use a password manager but still use passwords like abc123 instead of randomly generated and heavily encrypted ones. Sure, user data was stolen. Good luck decrypting the passwords themselves. And for the record, your passwords are already stored online without using a password manager. Every site you log in to has your password stored and any other info you've given them. Any site you belong to could at any point in time be hacked and your info stolen. And it's likely that even after the hack, peoples LastPass passwords still have heavier encryption then most websites are storing peoples password/data with.
I did. Why keep my passes "securely" in an ONLINE service?

Be sheep, boys and gals. Keep on believing on third parties to "secure" your digital life, instead of doing your own due diligence.
 

SylverReZ

The planet is fine. The people are crazy.
Member
GBAtemp Patron
Joined
Sep 13, 2022
Messages
7,203
Trophies
3
Location
The Wired
Website
m4x1mumrez87.neocities.org
XP
22,035
Country
United Kingdom
I'd recommend a XOR-based encryption with a variable input value based on a custom function.
XOR, MD5, amongst many other checksum and encryptions are easily crackable by brute force.
 

RHOPKINS13

Geek
Member
Joined
Jan 31, 2009
Messages
1,354
Trophies
2
XP
2,623
Country
United States
KeePass is actually really darn secure if you set it up right. You can host your KeePass database on Google Drive or some other cloud service. Use a key file, and it will be extremely difficult to brute force. Copy your key file to your PC, laptop, phone, etc. anywhere you want to have access to your KeePass database from.

Now, for a hacker to get your information, they have to hack BOTH your cloud service account for the database AND your personal device for the key. Add in a secure password on top of that? Very unlikely anybody is going to be able to break into that.

You could take it a step further and host the database yourself rather than a cloud service. You might already have a NAS at home you can throw it on, or some routers have features to do this built-in. Setup dynamic DNS because you most likely have a dynamic IP address, and if you host it using SFTP you can use an SSH key rather than a password to access it (much more secure.)

At this point, you're pretty damn safe. Even if somebody did somehow jump through all the hoops to hack into your stuff, that's a ton of work just to break into one person's accounts. You'd have to be a really high profile target for somebody to even consider it. They'd have much better luck either hacking into a system like LastPass or Bitwarden, where they could potentially get access to thousands of user accounts.
 

toolazytosearchitmyself

Well-Known Member
Member
Joined
Nov 24, 2022
Messages
119
Trophies
0
Age
54
XP
424
Country
Australia
I don't know exactly what LastPass does and doesn't do on their end, but for any sort of security related solutions companies should have dedicated cyber-security teams to minimise the risk of a breach. All customer data should be encrypted, not just the passwords.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    Metoroid0 @ Metoroid0: im more interested in metroid prime 4