Another LastPass Security Incident

Soldato
Joined
5 Mar 2010
Posts
12,359
I moved from lastpass and Google authenticator and consolidated everything to Bitwarden and Authy. Very easy to keep things synced across PC and mobiles devices and the UIs seem perfectly functional to me.

Just an FYI if you didn't know, Bitwarden premium can generate your 2FA codes. I just found it s faff having a password auto filled and then having to load Authy to generate a code. Bitwarden is nice and clever that if you're using a site that needs a 2FA code, once you auto-filled your username and password it fills the paste buffer with your 2FA code so you can immediately paste it in.
 
Soldato
Joined
14 Sep 2007
Posts
15,660
Location
Limbo
Time to move elsewhere it seems, my master password (random symbols and 15+ words) and other passwords are fairly solid but I feel a need to cycle through and change everything on the back of this 2nd incident.
 
Soldato
OP
Joined
1 Nov 2004
Posts
4,756
So all the password data has been accessed but it's still encrypted. So, just a case of brute forcing and catching out the weak ones then?

I had to read it a couple of times but that's pretty much how i read it and they say if you was using a 12 digit pass then it wouldn't be easy.

Time to move elsewhere it seems, my master password (random symbols and 15+ words) and other passwords are fairly solid but I feel a need to cycle through and change everything on the back of this 2nd incident.

Any password manager is going to be a target and wonder if they will be so open if they get hacked?

Just an FYI if you didn't know, Bitwarden premium can generate your 2FA codes.

It is annoying having to piddle about with a separate authenticator.
 
Soldato
Joined
17 Oct 2007
Posts
3,835
While I have mentioned this before, having a secret code that you add to somewhere to the password means even if someone gains access to your passwords, they are useless without that secret code. Also, enabling 2 factor authentication is obviously an extremely good idea.
 
Soldato
Joined
5 Mar 2010
Posts
12,359
Are there any viable alternatives that are more resilient to hacking?

I would say the only really secure option is hosting your own, but it'll have it's limitations for working remotely (outside the home). Your best bet really is setting up a VPN in this instance rather than opening ports/port forwarding.

My passwords are pretty secure, and every site has a randomly generated 30 character password. So if one site becomes compromised then I only need to scrap that password.

The last few months I've also been moving my accounts over to Simple Login which is basically an email forwarding service. That way if a site becomes compromised they only get your alias rather than your actual email.
 
Permabanned
Joined
9 Aug 2008
Posts
35,707
I would say the only really secure option is hosting your own, but it'll have it's limitations for working remotely (outside the home). Your best bet really is setting up a VPN in this instance rather than opening ports/port forwarding.

Problem with this is you always have to go through the VPN. Will be a pain IMO if you don't always don't need to be on it. I use Caddy web server and it sits behind a reverse proxy. I accept not everyone will be able to do this option so just hosting it with BitWarden is the only choice for most.

When I check my logs I do have attempts but nobody is getting in as it's got 2FA attached to the account.
 
Last edited:
Soldato
Joined
5 Mar 2010
Posts
12,359
Problem with this is you always have to go through the VPN. Will be a pain IMO if you don't always don't need to be on it. I use Caddy web server and it sits behind a reverse proxy. I accept not everyone will be able to do this option so just hosting it with BitWarden is the only choice for most.

When I check my logs I do have attempts but nobody is getting in as it's got 2FA attached to the account.

Yep you've gotta make a compromise somewhere between being secure and ease of use. IMO you're better off having it hosted by Bitwarden and having secure passwords with 2FA.
 
Permabanned
Joined
9 Aug 2008
Posts
35,707
I'm thinking of moving to Bitwarden premium. £10 is negligible.

£10 works out at roughly 0.027 pence per day.
It's about a pint and 1/4 in London lol

I don't have the skills or patience to host my own and make it effective enough.

You need working knowledge of web servers, security, reverse proxies, ssl certs and domain configuration to get it working properly. Then there's mail settings so that it emails you when there's a log in or anything else it needs to email you about. I have it connected to an SMTP server and sign up is disabled because you can allow multiple people to use the service with a log in. It's pretty funky.
 
Last edited:
Soldato
Joined
19 Nov 2004
Posts
12,516
Location
Wokingham
£10 works out at roughly 0.027 pence per day.
It's about a pint and 1/4 in London lol



You need working knowledge of web servers, security, reverse proxies, ssl certs and domain configuration to get it working properly. Then there's mail settings so that it emails you when there's a log in or anything else it needs to email you about. I have it connected to an SMTP server and sign up is disabled because you can allow multiple people to use the service with a log in. It's pretty funky.
You lost me at reverse proxies.
 
Hitman
Soldato
Joined
25 Feb 2004
Posts
2,837
I had previously posted this in a similar topic:

I've moved from LastPass to Dashlane to Bitwarden and now to 1Password.

I love the UI and integration across browsers/devices, having different vaults shared between family members we can all contribute to including having policies/documents in there for easy access for all, and they've fairly recently partnered with Fastmail where it'll generate a masked email for you when signing up to websites (I already use domain/[email protected] anyway, but it's a nice way to move the identity away from @mydomain.com if needed).

Still very happy with 1password, renewed for another year a month or so ago.
 
Soldato
Joined
13 Jan 2004
Posts
20,962
Anyone defending LastPass needs to reread the article and extent of the breach.

Personal Data and URLs were taken in an unencrypted form. This makes weaponising the breach so much easier and more potent.

The update also states the source code and other data stolen would have allowed futher exploitation and access to and decryption of cloud data.

Its generally accepted that data gets stolen, and as long as you used a strong master password the encrypted data lost isn't likely to be decrypted. Getting unencrypted data taken which can be used in phising and other attacks to decrypt the encrypted data is shocking.

Data loss aside there is a Privacy Question to ask - LastPass states they had a Zero Knowledge environment. They dont. (They have a readable list of all your services saved in their vault)
 
Soldato
Joined
5 Mar 2010
Posts
12,359
Anyone defending LastPass needs to reread the article and extent of the breach.

Personal Data and URLs were taken in an unencrypted form. This makes weaponising the breach so much easier and more potent.

The update also states the source code and other data stolen would have allowed futher exploitation and access to and decryption of cloud data.

Its generally accepted that data gets stolen, and as long as you used a strong master password the encrypted data lost isn't likely to be decrypted. Getting unencrypted data taken which can be used in phising and other attacks to decrypt the encrypted data is shocking.

Data loss aside there is a Privacy Question to ask - LastPass states they had a Zero Knowledge environment. They dont. (They have a readable list of all your services saved in their vault)

I don't think anyone is defending lastpass on here :cry:
 
Back
Top Bottom