In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. Since then, a steady trickle of six-figure cryptocurrency heists targeting security-conscious…
Well, I mean…what did you think they were going to do with that data?
Dive into it like Scrooge McDuck, obviously
A fine idea. This guy hax.
TLDR;
In November 2022, LastPass, a password manager service, suffered a data breach in which hackers stole password vaults containing encrypted and plaintext data for over 25 million users. Since then, there has been a series of cryptocurrency thefts targeting individuals in the tech industry, totaling more than $35 million. These thefts primarily targeted individuals deeply integrated into the cryptocurrency ecosystem, including employees of crypto organizations and venture capitalists.
Researchers, led by Taylor Monahan, CEO of MetaMask, have identified a common factor among these victims: they had previously used LastPass to store their “seed phrase,” which is a critical private key for accessing their cryptocurrency investments. Armed with this seed phrase, attackers can instantly access and transfer the victim’s cryptocurrency holdings.
The LastPass breach exposed vulnerabilities in its security, particularly related to the master passwords and encryption settings. LastPass users who stored important passwords, especially for cryptocurrency accounts, are urged to change their credentials immediately and migrate their crypto holdings to offline hardware wallets. Alternatives like 1Password, which offer additional security layers like a Secret Key, are recommended.
While the research suggests a strong link between the LastPass breach and the cryptocurrency thefts, it’s challenging to definitively prove causation. Nonetheless, security experts advise taking immediate action to protect digital assets.
You’re telling me it’s a bad idea to aggregate all of your passwords through a third party? Who could have seen this coming
Apparently very few people, somehow. Because the internet was filled with people explaining how it was actually much safer than writing them down in a book because “what if someone goes through your desk?”. I’m told it’s much safer to entrust your passwords to a third party over the internet.
deleted by creator
Id like to see you manage the 5000 different passwords I have in my manager with your brain
deleted by creator
It’s easy peasy. I don’t have to remember a single password – just the system that I use to make passwords. The only time the system breaks down is my work accounts because we do SSO about as well as you’d expect.
downvotes make me horny.
And this is why you don’t want cloud based password storage systems. If you want to use a password manager, use something entirely local like KeePassXC. The database it creates is so small you could fit it on a floppy so it’s immensely portable.
Cloud based systems can be perfectly sound. You can read how other managers do it, which are also audited by security experts. It’s just LastPass being bad.
And sure, local can be more secure, but you’re then at higher risk of losing access to it, should the worst happen.
They are a real treasure trove though. Those crypto token thefts show there’s much money in that. I wouldn’t bet my most sensitive data they covered every single attack vector - external or internal. You managing your password locally may be much less secure but it’s also much less likely you’re directly targeted.
The accounts they’re breaking the encryption on were never configured properly. These are old accounts from when LastPass had weak defaults and neither the user or LastPass updated those settings on old accounts. Those settings have always existed though and could have been improved by the user.
The problem is more that LastPass’ system is bad. 1password (and probably others) mitigate a possible hack by having the keyring encrypted by something in addition to the password.
If you used weak passwords, gave them to a third party, the third party had their data stolen, and you didn’t rotate them, it’s your own fault.
it’s a bad idea to have all your passwords centralized but for me it’s still an upgrade in security compared to remembering a few different passwords. I understand security is very important but I want to be able to appreciate convenience and not have to write all my random passwords on a book that I would have to bring with me all the time and look at every time I want to type a password. there’s no such thing as bulletproof security. I’m quite happy to have reduced my attack vectors to nearly one single point so I can focus on defending that one single point.
Password vaults are great! Giving them to a central authority is… a little risky though. LP has a pretty decent history other than this, so I don’t fault anyone for using them. But after that breach, it’s probably good to consider those creds burned and recycle them.
A good self-hosted alternative might be something like Keepass on Syncthing. Though a downside of that is that you might be even less likely to know of a vault exfil than a service like LP.
Either way you go, it’s good to recognize the limiations and act accordingly.
deleted by creator
deleted by creator
These online password manager services are all half-baked scams that get away scot-free in any event of a breach (whichever the ones they just cannot silently hide away).
Only when/if they offer a minimum compensation backed by third party reputable Surety Insurance of at least US$5000 for every single breach for each compromised password/key/wallet/service for each effected customers would I even consider take a gander at their “unbreakable/unhackable” password manager service.
Until such a day arrives, I will continue to use FIDO2 hardware keys (Yubikey), asymmetric certificate pairs (gpg2, SSH, TLS, etc…) and the good old remember all my darn long passwords in my brain for symmetric ciphers (rjindael, serpent, chacha20, etc…) with the added help of Argon2id whenever implemented/available.
I sure hope companies becomes financially liable and accountable for all their privacy/security breaches unlike the last few decades of no consequence or just getting away with a negotiable fine.