Writing more about #LastPassBreach feels like beating a dead horse. But I had a look at the official statement again and it is highly misleading. I felt the need to provide some context that #LastPass is willingly omitting.

“Again, it seems that LastPass attempts to minimize the risk of litigation (hence alerting businesses) while also trying to prevent a public outcry (so not notifying the general public). Priorities…”

https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/

What’s in a PR statement: LastPass breach explained

The LastPass statement on their latest breach is full of omissions, half-truths and outright lies. I’m providing the necessary context for some of their claims.

Almost Secure
@WPalant thank you for all your work, it’s been very illuminating!
@WPalant Your RSS feed (https://palant.info/rss.xml) contains an <meta http-equiv="refresh"> tag that is causing my feed reader browser extension (Feedbro) to auto-redirect to your article. I kid you not. What is that code doing in your feed?
@WPalant I had to remove your feed from Feedbro because I couldn’t use it anymore. It would just auto-redirect to your article as soon as I looked at the feeds.

@simevidas LOL. Sounds like your feed reader isn’t doing any content sanitizing which likely renders it vulnerable to way more than merely that redirect. I found quite a few vulnerabilities like that back in the day, and I was quite happy when Firefox added sane built-in RSS functionality. Too bad that browsers are leaving this to extensions again.

This was actually an experiment meant for a notorious thief. See https://infosec.exchange/users/WPalant/statuses/109483011827939479. I guess that there is a human component in their lifting pipeline after all because my latest blog posts haven’t been added.

I’ve removed that tag now.

Yellow Flag (@[email protected])

Attached: 1 image There is this website, laptrinhx[.]com. It is copying content from other websites, not even bothering to change image link to point away from the original server. And it has the audacity to demand that people disable ad blockers to view their “awesome” content. Well, I don’t like that. So I added the following nginx rule: if ($http_referer ~ '^https?://laptrinhx\.com/') { rewrite \.(jpg|png)$ /temp/stealing.jpg; } My articles on their website are now looking absolutely awesome.

Infosec Exchange
@WPalant Hehe, I’ll let Feedbro know.

@simevidas They already have their “tag filter” that they will likely add <meta> to without resolving the vulnerability.

Sorry to say that but this extension is beyond horrible security-wise.

@WPalant great article. What would you recommend please for someone who wants a password manager on multiple devices, which supports yubikey and is better than LP?
@yeleek Sorry, I’m a bad person to ask for recommendation. I wrote my own password manager because I was unhappy with my choices. From the products I looked at, 1Password is the only one I could recommend security-wise. But another security researcher I very much respect isn’t very fond of their vulnerability handling.

@WPalant this is an excellent analysis!

I'd like to add that their wording around "Secure Notes" created a huge amount of confusion, where many of us assumed what Lastpass was doing was less secure than what they were actually doing.

It's really a terrible, terrible example of breach communication.

@WPalant I am happy that I ditched lastpass two breaches ago. They clearly can be trusted and they seem to have serious systemic security issues within their product.

@WPalant They did the *exact* same thing with the last time they did this.
While they sent out a bunch of emails to say someone logged into your account, in their 'apology' statement, they said we shouldn't be reusing passwords and such.

I already had left LP before that, but that kind of condescending attitude told me everything I need to know about the company.

@WPalant asking for a friend and possibly a dumb question..... does anyone know if text or comment fields etc inside the stolen vault backups were encrypted? If they were unencrypted would you still need master password to view them?
@greyghost They are encrypted, in the same way the passwords are. I covered it here: https://palant.info/2022/12/24/what-data-does-lastpass-encrypt/
What data does LastPass encrypt?

LastPass doesn’t explain what data in its “vault” is encrypted. Everyone can download their data and see for themselves easily however.

Almost Secure
@WPalant awesome!
Appreciate that.
@WPalant I found a family member who was a long time LP user with only 500 PBKDF2 iterations, how easy might that be to crack? They did have a > 20 character master password.

@brm The length of the password in itself unfortunately isn’t meaningful. You can get a rough idea of password complexity on https://lowe.github.io/tryzxcvbn/. Mind you, it isn’t perfect: it won’t recognize many patterns and thus overestimate the complexity.

At 500 iterations, we are talking about 17,500,000 guesses per second on a single graphics card. So for a rough estimate take the “10B / second” result and multiply it with thousand.

zxcvbn tests

hey @WPalant I was a LastPass user, but I closed the account in October. Do you think my data is in danger?
@olek Yes, most likely. LastPass still won’t tell when the data was copied, but I strongly suspect that it was before October. And even for people who closed their accounts before August, the big question is whether the data was also removed from this “backup storage.”
@WPalant understood 👍
shouldn't be like that LastPass sends an email to me with the information that my data has been breached?

@olek They did, to all the active accounts. Your fault, you having deleted your account at a wrong time. 🤷‍♂️

I wonder what the US law would say about it. Somebody should try it out.

@WPalant that's wrong 😞 they should have informed me anyway...
@olek Yes, that was sarcasm. I’m fairly certain that the disclosure laws require them to notify affected former customers as well. Question is whether there will be any notable consequences for them because of failing to do so.

@WPalant

I got your sarcasm 😄

let's say, I don't want to have anything to do with LastPass and I'm a happy customer of @bitwarden

what should I do, to be sure I'm not in danger? Change all the passwords that I imported from LastPass to Bitwarden?

@olek Yes, that would definitely put you on the safe side. At the very least it’s a good idea to change the password for important accounts (email, banking, shopping).
@WPalant understood, will do! thanks for the advice 👍
@WPalant excellent read. as a LP user, my password iteration was set at 5000, and I changed it to 100,100 as per the LP blog last week. I guess I should increase it further?? Would you suggest I ditch LP and go elsewhere - if so, where? Have tried 1Password and didn’t like it.

@fatwelshbuddha Yes, increasing it at least to 310,000 (per OWASP recommendation) would be advisable.

Also, you should strongly consider changing all your passwords. Accounts with 5000 iterations and less will likely be targeted first.

Personally: yes, you should definitely consider changing to a competitor who does a better job at keeping your passwords secure. People usually recommend 1Password or Bitwarden.

@WPalant thanks for the feedback. will update the iterations. as for changing passwords, I have sooooo many, but I’ll focus on the master one and financial sites. I’ll think about a change but I’m so embedded with the way LP works I’m somewhat reluctant to swap and trust ongoing security will be beefed up.
@WPalant very interesting info and I have a practical questions : if you have a last pass account, what is the best way to delete all info safely on their server?
@tomoz1 This is not something you can tell from the outside. Especially not, when it comes to backup storage which is where the data leaked.
@WPalant
well, then let's hope a delete via the site does a full delete of everything and not just stops me from accessing anything

@WPalant latest: LastPass parent company was hacked too. who would have thought? /sarcasm

more shit hitting a higher ceiling.

https://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/

GoTo says hackers stole customers' backups and encryption key

GoTo (formerly LogMeIn) is warning that threat actors stole encrypted backups containing customer information and an encryption key for a portion of that data.

BleepingComputer