{"id":165902,"date":"2022-12-23T05:25:07","date_gmt":"2022-12-23T05:25:07","guid":{"rendered":"https:\/\/harchi90.com\/lastpass-says-hackers-stole-customers-password-vaults-techcrunch\/"},"modified":"2022-12-23T05:25:07","modified_gmt":"2022-12-23T05:25:07","slug":"lastpass-says-hackers-stole-customers-password-vaults-techcrunch","status":"publish","type":"post","link":"https:\/\/harchi90.com\/lastpass-says-hackers-stole-customers-password-vaults-techcrunch\/","title":{"rendered":"LastPass says hackers stole customers’ password vaults \u2022 TechCrunch"},"content":{"rendered":"
Password manager giant LastPass has confirmed that cybercriminals stole its customers’ encrypted password vaults, which store its customers’ passwords and other secrets, in a data breach earlier this year.<\/p>\n
In an updated blog post on its disclosure, LastPass CEO Karim Toubba said the intruders took a copy of a backup of customer vault data by using cloud storage keys stolen from a LastPass employee. The cache of customer password vaults is stored in a \u201cproprietary binary format\u201d that contains both unencrypted and encrypted vault data, but technical and security details of this proprietary format weren’t specified. The unencrypted data includes vault-stored web addresses, but LastPass does not say more or in what context. It’s not clear how recent the stolen backups are.<\/p>\n
LastPass said customers’ password vaults are encrypted and can only be unlocked with the customers’ master password, which is only known to the customer. But the company warned that the cybercriminals behind the intrusion \u201cmay attempt to use brute force to guess your master password and decrypt the copies of vault data they took.\u201d<\/p>\n
Toubba said that the cybercriminals also took vast reams of customer data, including names, email addresses, phone numbers and some billing information.<\/p>\n
Password managers are overwhelmingly a good thing to use for storing your passwords, which should all be long, complex and unique to each site or service. But security incidents like this are a reminder that not all password managers are created equal and can be attacked, or compromised, in different ways. Given that everyone’s threat model is different, no one person will have the same requirements as the other.<\/p>\n
In a rare shituation (not a typo) like this \u2014 which we spelled out in our parsing of LastPass’s data breach notice \u2014 if a bad actor has access to customers’ encrypted password vaults, \u201call they would need is a victim’s master password.\u201d An exposed or compromised password vault is only as strong as the encryption \u2014 and the password \u2014 used to scramble it.<\/p>\n
The best thing you can do as a LastPass customer is to change your current LastPass master password to a new and unique password (or passphrase) that is written down and kept in a safe place. This means that your current LastPass vault is secured.<\/p>\n
If you think that your LastPass password vault could be compromised \u2014 such as if your master password is weak or you’ve used it elsewhere \u2014 you should begin changing the passwords stored in your LastPass vault. Start with the most critical accounts, such as your email accounts, your cell phone plan account, your bank accounts and your social media accounts, and work your way down the priority list.<\/p>\n
The good news is that any account protected with two-factor authentication will make it far more difficult for an attacker to access your accounts without that second factor, such as a phone pop-up or a texted or emailed code. That’s why it’s important to secure those second-factor accounts first, like your email accounts and cell phone plan accounts.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"
Password manager giant LastPass has confirmed that cybercriminals stole its customers’ encrypted password vaults, which store its customers’ passwords and other secrets, in a data breach earlier this year. In an updated blog post on its disclosure, LastPass CEO Karim Toubba said the intruders took a copy of a backup of customer vault data by …<\/p>\n