LASTPASS NEWS ALERT AND COMMENTARY:
LastPass attackers know your name and billing address and all websites you have saved passwords for, and if your master password isn't sufficiently strong may be possible to brute-force open everything on attacker's machines.

PLEASE READ BEFORE PROCEEDING: https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/

The fact LastPass doesn't encrypt website URLs is a known flaw it appears they never fixed on purpose, going back almost 6 years:
https://hackernoon.com/psa-lastpass-does-not-encrypt-everything-in-your-vault-8722d69b2032

This eventual possible security breach was planned-for as part of LastPass' design for username and password protection. This doesn't break the core offering.
But it has stripped away multiple layers of protection and will hasten my looking at @bitwarden

It's impossible to be completely secure in a massive offering. However I have always disagreed with their decision to not 100% encrypt all metadata, and this event shows that was a foolish choice when seen against the inevitable of the entropy our complex electronic systems.

In the end, a password manager is still right choice in comparison to alternative. And a cloud-native offering like LastPass strongly hedges against data loss by normal users trying to manage their own vault. That is an undersold primary risk, not hackers. Still, very disappointed.

Current password setup:
- Primary vault is LastPass with 2FA
- Core fallback "key" accounts like email that allow pw reset are only in a KeyPass db file with 20char password, synced via OneDrive+2FA.
- This is then further backed-up with BackBlaze, using 40char encryption key

Security Incident December 2022 Update - LastPass

We are working diligently to understand the scope of the incident and identify what specific information has been accessed.

The LastPass Blog
@SwiftOnSecurity Appreciate your comments on this, so very much
@azninsect something even simple like this means a lot to hear thank you
@azninsect
@SwiftOnSecurity Agreed, this is a well balanced description I can send to my boss.

@SwiftOnSecurity @bitwarden

I was a LONG TIME Lastpass user and absolutely dreaded the switch, but I'm convinced that, at least from a usability perspective, BitWarden is a superior product - particularly the TOTP features. The migration was wonky (both LP and BW played a part - LMK if you want the details on what I ran into), but doable.

@EvieAlways @SwiftOnSecurity @bitwarden What TOTP features does BW have that LP doesn't, if you don't mind my asking?

@Brandon @SwiftOnSecurity @bitwarden

In LP, OTPs are in a separate disconnected app. BW has put the OPT features right in their one app - it's way more convenient and elegant.

@EvieAlways I'll check it out, thank you.
How do I create a time-based one-time passcode (TOTP) for site entries as a LastPass business account user? - LastPass Support

If you have a LastPass Teams or LastPass Business account, you can create a time-based one-time passcode (TOTP) from your vault and use it for authentication when logging in to a third-party app or website.

@EvieAlways @Brandon @SwiftOnSecurity @bitwarden Uh... if I had had my TOTP within LastPass I'd actually feel a LOT worse now. Having passwords AND 2FA in the same platform obviously defeats the whole purpose!
@EvieAlways @SwiftOnSecurity @bitwarden I made the same switch a while back and very glad I did.
@EvieAlways @SwiftOnSecurity @bitwarden I ADORE 1pass feature of, open extension, site is already highlighted lines, click menu and scan QR code. Now you have 2fa. Literally no reason not to anymore.

@EvieAlways @SwiftOnSecurity @bitwarden I've been very happy with my self hosted instance that uses VaultWarden under the hood.

https://github.com/dani-garcia/vaultwarden

GitHub - dani-garcia/vaultwarden: Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs

Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs - dani-garcia/vaultwarden

GitHub

@plasticbiker @EvieAlways @SwiftOnSecurity If you like selfhosting a more lightweight version of Bitwarden, you might be interested to know that we recently lauched a Unified self hosted version (currently in beta) of Bitwarden that can run on a Raspberry Pi etc..

https://bitwarden.com/help/install-and-deploy-unified-beta/

Install and Deploy - Unified (Beta) | Bitwarden Help Center

This article will walk you through installing and launching the Bitwarden unified self-hosted deployment.

Bitwarden
@EvieAlways @SwiftOnSecurity @bitwarden absolutely love and suggest Bitwarden as well. Fantastic
@EvieAlways @SwiftOnSecurity @bitwarden did same migration a few years ago to a self-hosted containerised instance of Bitwarden. Haven’t looked back since.
@EvieAlways i'd like details pls, i recently made the swap but havent deleted my LP stuff cos i was afraid something was gonna go wrong and i didnt have time to check that >.<
@EvieAlways @SwiftOnSecurity @bitwarden bitwarden works better on my Android than LastPass ever did, too.
@EvieAlways @SwiftOnSecurity @bitwarden I recently switch from LastPass to Bitwarden. Surprisingly easy and pain free.
@EvieAlways @SwiftOnSecurity @bitwarden I made the move from Lastpass to Bitwarden a few years ago. It was much less painful than I expected. FWIW I made the move more for very personal reasons than anything else, but I've never looked back and never regretted the move.
@EvieAlways @SwiftOnSecurity @bitwarden interesting, I did the switch long time ago and it was quite seamless, afair. Wonder what was changed in the process in the meantime...
@EvieAlways @SwiftOnSecurity @bitwarden I think migration issues is why I never made it over to bw previously
@EvieAlways @SwiftOnSecurity @bitwarden Ooh, was it an incompatible export file? I had to figure out the CLI to get my KeePass stuff into BW so it was recognized and formatted properly.
@EvieAlways Also, I hate the logout to refresh thing you mentioned on BW, but it's a minor inconvenience (so far)
@infinite_loopy It seems specific to the import process. I haven't run into it otherwise.
@EvieAlways I see it every now and then if I manually add a new login to the organization (instead of my personal vault). But it's minor so far.
@infinite_loopy
I don't think so. It was 2 things: first a glitch in the LP export that appeared to duplicate a LOT of data, then the "refresh after import" bug that made me think that the import didn't complete (and subsequently do dumb things that was most easily fixed with a purge)
@SwiftOnSecurity Stupid question: why two different services instead of KeyPass with two different vaults backed up separately? Is KP somehow vulnerable in a way I don't know?
@nohhue LastPass is more convenient across multiple devices including iPhone and browser integration. KeePass is extremely powerful but it fundamentally can't do some (optional) things.

@SwiftOnSecurity There isn't a third party app(s) like on Android? Legit curious what the optional are (if not NDA/job related) as a KP user.

I'd be interested in your opinion(s) on this via Decent Security articles if you're still updating that.

@SwiftOnSecurity @nohhue Have been through LastPass and Dashlane but now use @bitwarden and have found it great - the others both had issues, browser related and then Android related, and @bitwarden has solved them both from a usability perspective
@SwiftOnSecurity I moved to @bitwarden a couple years back but I look forward to hearing your thoughts on it eventually. As a lowly Security+ who never finished his planned CISSP years ago as my career diverged, i feel very out of date!
@SwiftOnSecurity @bitwarden been using 1Password for a decade and would definitely recommend
@SwiftOnSecurity I don't understand why people don't just use 1Password. LastPass is synonymous with "breach" at this point.
@SwiftOnSecurity @bitwarden I don’t hear any opinions on Dashlane in this conversation. Anybody have pros or cons for that service?
@SwiftOnSecurity Is your plan to replace LastPass with BitWarden, or replace LastPass AND KeePass with BitWarden?
Any reason not to use browser (Firefox or Chrome) password storage with a master key, instead of web-based tools?

@SwiftOnSecurity @bitwarden

In most every way I’ve found BitWarden to be equal to or better than LastPass.

The only negative thing I have to say about BitWarden is the lack of editing your vault while offline. Meaning you cannot create or modify and entry unless you have a connection to the server, self-hosted or on the internet. Its been on the roadmap for a while without a planned implementation timeframe.

@chuckfrain @SwiftOnSecurity @bitwarden

Agreed, it's weird that #Bitwarden & #Vaultwarden (another implementation of the Bitwarden API) don't support editing the vault offline. Not sure if it's a limitation of the API or something. It's probably the only downside.

However, I agree, Bitwarden is much better than LastPass. It also provides a way for you to self-host and you can even host it without it being available on the public Internet if you only make it available within your own VPN so only your devices can ever see your Bitwarden instance.
Akkoma

@SwiftOnSecurity @bitwarden I've spent the last 5 years getting everyone I could off of LastPass and onto KeePassX, BitWarden, or my personal favorite 1Password after in a security review for a previous company we were able to successfully phish LastPass to /change our master password/ for our enterprise account and then access employee vaults. The fact they could do that suggests to me they don't follow their own design at least for enterprise customers and vaults are not secure.
Can you reach the Backblaze backup even if you lost access to all of your devices?
basically a worst case scenario?

Also highly recommend @bitwarden been using it for a long time and never had a problem.
Also you can self host it, or its rust-rewritten version, vaultwarden.
@fariszr @bitwarden I left out a step I backup to an encrypted external drive which then mirrors to Backblaze
And then if you lose that?

I am thinking of doing something like an emergency encrypted archive, stored somewhere public where I can always reach it, so that I can use it to re-access everything, password manager, 2fa, keys, etc.

Also I found this to be interesting

https://mprimi.github.io/portable-secret/
šŸ” Portable Secret

Better privacy without special software

portable-secret
@SwiftOnSecurity @bitwarden holy shit every detail about this is worse than the last. I haven't used LastPass in 6 years, I have a regular task to rotate a password at least once a week, but TIL the few I haven't gotten to yet are protected by *5000* rounds of PBKDF2. wtffffff
@SwiftOnSecurity @bitwarden
@christian
I have the Last Pass app but never got around to putting in my passwords. For once my procrastination habit paid off!

@SwiftOnSecurity @bitwarden @keepassxc KeepassXC is an awesome tool to get a offline password manager...

Remember that what goes to the cloud, stays in the cloud

@SwiftOnSecurity @bitwarden Thanks for this. My son has been telling me to go to Bitwarden so I finally did. Changed all my passwords at the same time.
@SwiftOnSecurity This was the final nudge I needed to change password managers. Liking 1password a lot so far.
@SwiftOnSecurity forgive me if this has been asked to death, but I’d love to hear your thoughts about 1Password. I’d be happy to read a link to where you have talked about it before - it just feels like the elephant in the room here.
@SwiftOnSecurity @bitwarden have you had issues with OneDrive corrupting your keypass database? My team attempted to use OneDrive and share the db, but a shared user opening it in OneDrive corrupted it 100% of the time. We did not have this issue with Syncplicity.
@SwiftOnSecurity @bitwarden Should I be worried about brute forcing with a master password that is over 20 characters long? Or should I still change all of the stored passwords that I have anyway?
@SwiftOnSecurity @bitwarden I don't understand why I'd be any more at risk now than prior to the breech? Wouldn't my account have been just as susceptible to a brute force attack then as it is now?
@SwiftOnSecurity is there an explanation somewhere of why these third party password managers are recommended over the one built into the browser? I have never understood this