LastPass Breach Recommendations for End-Users
Robert Fernandes
Award Winning CISO | vCISO | Keynote Speaker | TEDx Speaker | Cybersecurity | Business Resiliency | Leadership | Nonprofit Founder @ Cyberchance | Fluent in English and Spanish
LastPass (Password Manager) was breached. Here is my take on the situation and recommendations.
LastPass issued a Notice of Recent Security Incident on December 22, 2022. This was an update to a previous notification that they disclosed in August 2022. The latest update contains some concerning revelations. During the August incident, no client data was accessed. However, source code and technical info was accessed. A threat actor used this info to target and compromise a LastPass developer, which is what lead to this newest incident. As a result, they were able to access LastPass storage volumes that contained backups. These backups contained customer contact information and other metadata for customers. They were also able to access customer vault data that contained both encrypted data such as usernames and passwords, as well as unencrypted customer data such as URLs of the websites saved in LastPass. For the encrypted data, the threat actor does not have access to your passwords. But they can attempt to get access to them over time. Action is needed to mitigate this.
?So what does this mean to the end-user?
Threat actors have access to LastPass users’ billing info and other metadata. They also have access to LastPass users’ websites.
Threat actors have downloaded and have access to your encrypted password vault.
Anyone can be hacked. Often, you will see a company become more secure after a breach. However, LastPass had a few incidents over the years and I am not certain of the true extent of this incident. We will have to wait and see what is to come.?If you are using LastPass today, I am recommending users migrate to another Password Manager such as Bitwarden, 1Password, or KeePass. However, as I mentioned, anyone can be hacked, and they can be as well.
?Password Managers are still relevant today. I still recommend the use of a password manager, in combination with strong, unique passphrases and MFA for each site that you access. There are on-premise password managers and there are cloud-based password manager services. Determining which type is best for you depends on your risk appetite. On-premise password managers are more secure, but also less convenient to use for many users.
MFA should be mandatory for all services. Passwords alone are not enough.
My recommendations are:
Chief Marketing Officer | Product MVP Expert | Cyber Security Enthusiast | @ GITEX DUBAI in October
2 年Robert, thanks for sharing!
Robert Fernandes I shared extensively about this topic last week here- https://www.dhirubhai.net/posts/mendy-kupfer-a81a142b_security-change-data-activity-7013867047495294976-s2f0?utm_source=share&utm_medium=member_ios The questions I keep getting are: which password manager to switch to? What are your thoughts on this?
Full Stack Multi-VM Web3 Developer | Bitcoin Technical Writer | I transform complex projects into triumphs thru inspiration, iteration & storytelling | Bitcoin adoption pioneer | Rust, Solidity, Next.js, Move, Solid.js
2 年I came to the same conclusion. LastPass is dead.