{"id":20925,"date":"2023-01-03T16:10:42","date_gmt":"2023-01-04T00:10:42","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/01\/03\/news-14658\/"},"modified":"2023-01-03T16:10:42","modified_gmt":"2023-01-04T00:10:42","slug":"news-14658","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/01\/03\/news-14658\/","title":{"rendered":"LastPass updates security notice with information about a recent incident"},"content":{"rendered":"<p>The password management company&nbsp;LastPasss <a href=\"https:\/\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/\">notified customers in late December<\/a>&nbsp;about a recent security incident. The notice was posted as an update of the security incident previously <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/source-code-of-password-manager-lastpass-stolen-by-attacker\">reported<\/a> in August of 2022, which also was <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/lastpass-breach-affects-customer-data-but-not-passwords\">updated and covered<\/a> on November 30, 2022.<\/p>\n<p>According to LastPass, an unknown threat actor accessed a cloud-based storage environment leveraging information obtained from the August incident. Some of the stolen source code and technical information&nbsp;were&nbsp;used to target another LastPass employee, which allowed the threat actor to obtain credentials and keys which were used to access and decrypt some storage volumes within the cloud-based storage service.<\/p>\n<h2>Actions for customers<\/h2>\n<p>LastPass states that users that followed their best password practices have nothing to worry about. LastPass&rsquo; default master password settings and best practices include the following:&nbsp;<\/p>\n<ul>\n<li>Since 2018, a twelve-character minimum for master passwords is required.<\/li>\n<li>LastPass utilizes a stronger-than-typical implementation of 100,100 iterations of the Password-Based Key Derivation Function (PBKDF2), a password-strengthening algorithm that makes it difficult to guess your master password. You can check the current number of PBKDF2 iterations for your LastPass account <a href=\"https:\/\/support.lastpass.com\/help\/how-do-i-change-my-password-iterations-for-lastpass\" target=\"_blank\">here<\/a>.<\/li>\n<li>It is recommended that you never reuse your master password on other websites. This is always true, but it completely defeats the security advantage of using a <a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\">password manager<\/a>. In case of a leaked or stolen password, threat actors can use <a href=\"https:\/\/www.malwarebytes.com\/glossary\/credential-stuffing\">credential stuffing<\/a> techniques to unlock other accounts.<\/li>\n<\/ul>\n<p>According to LastPass, if you followed these guidelines, it would take millions of years to guess your master password using generally-available password-cracking technology.<\/p>\n<p>If you haven&rsquo;t done so already, we would advise&nbsp;that you&nbsp;enable&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a>&nbsp;on your LastPass accounts so that threat actors won&#8217;t be able to access your account even if your password was compromised. The&nbsp;<a href=\"https:\/\/support.lastpass.com\/help\/enable-multifactor-authentication-lp010002\" target=\"_blank\">instructions to enable MFA<\/a>&nbsp;can be found on the LastPass support pages.<\/p>\n<h2>LastPass<\/h2>\n<p>LastPass offers a password manager which is reportedly used by more than 33 million people and 100,000 businesses around the world. A password manager is a software application designed to store and manage online credentials. It also generates strong passwords. Usually, these passwords are stored in an encrypted database and locked behind a master password.<\/p>\n<p>As a keeper of that many passwords, LastPass is juicy prey for threat actors. So, it comes as a surprise that the initial breach&nbsp;was able to lead to further compromises.<\/p>\n<h2>Unencrypted data<\/h2>\n<p>Security researchers are worried about the fact that LastPass stores website URLs unencrypted.<\/p>\n<p><a href=\"https:\/\/twitter.com\/MichaelMParsons\/status\/1606091697749794816\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/01\/easset_upload_file36491_253811_e.png\" alt=\"Tweets\" width=\"601\" height=\"572\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/a><\/p>\n<p>These questions were raised because the security notice says:<\/p>\n<blockquote><p>&ldquo;The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data.&rdquo;<\/p><\/blockquote>\n<p>It is indeed hard to understand why LastPass would not consider website URLs sensitive fields and it makes you wonder what the other unencrypted data is. Leaked website URLs can lead to targeted pjhishing attacks, so LastPass users should be extra weary of emails asking them to log in or change their password at sites for which they have their password stored in LastPass. <strong>Always visit the site directly and do not follow the links in emails<\/strong>. And, as always, <strong>enable <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">MFA<\/a> where you can<\/strong>.<\/p>\n<p>We have reached out to LastPass to ask for additional information and we will keep you informed here.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"&ldquo;https:\/\/www.malwarebytes.com\/for-home&rdquo;\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/01\/lastpass-updates-security-notice-with-information-about-a-recent-incident\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: LastPass<\/p>\n<p>Tags:  security<\/p>\n<p>Tags:  incident<\/p>\n<p>Tags:  update<\/p>\n<p>Tags:  notice<\/p>\n<p>Tags:  unencrypted data<\/p>\n<p>Tags:  password manager<\/p>\n<p>LastPass has posted an update to the August security incident that raises some questions about stolen unencrypted data<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/01\/lastpass-updates-security-notice-with-information-about-a-recent-incident\" title=\"LastPass updates security notice with information about a recent incident\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/01\/lastpass-updates-security-notice-with-information-about-a-recent-incident\">LastPass updates security notice with information about a recent incident<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2313,19012,32,28252,11347,714,28253,11304],"class_list":["post-20925","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-incident","tag-lastpass","tag-news","tag-notice","tag-password-manager","tag-security","tag-unencrypted-data","tag-update"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20925"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20925\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20925"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}