TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

LastPass: Notice of Security Incident

315 pointsby marconeyover 2 years ago

26 comments

autoexecover 2 years ago
Not enough data to say what the impact of this is. Good for them disclosing it early while they investigate.<p>&gt; we have seen no evidence that this incident involved any access to customer data or encrypted password vaults.<p>One way to prevent risk to your passwords in the event of a security breach is to not store them in the cloud at all. KeePass is great!
评论 #32598803 未加载
评论 #32598852 未加载
评论 #32600361 未加载
评论 #32602461 未加载
评论 #32610343 未加载
评论 #32606174 未加载
评论 #32615141 未加载
mancini0over 2 years ago
Lesspass generates reproducible unique passwords from inputs (username, domain, masterpassword). It works without an internet connection and is open source. You only need their cloud storage if you want to backup metadata about the password requirements for specific sites (i.e, no special chars allowed by foo.com, bar.com requires a capital letter and a number, etc.) This metadata can also be stored locally. The command line utility is great, they also offer Mozilla &#x2F; chrome extensions and mobile apps. I bash alias the command line command to copy the password into clipboard so when I navigate to a site on my laptop, I run genp chase or genp amazon and quickly have the pw ready to go in my clipboard. The apps &#x2F; extensions and even the cli uses emojis as a visual cue to let you know you typed in the correct masterpassword (since it&#x27;s masked)
评论 #32602104 未加载
评论 #32601851 未加载
评论 #32601327 未加载
评论 #32601343 未加载
m4jorover 2 years ago
I wonder if this was nation-state backed hackers or just some rando.<p>I&#x27;m guessing nation-state because it seems they stole some source code&#x2F;R&amp;D. I&#x27;d guess China. That&#x27;s their entire MO. Further the Chinese economy by any means necessary. Why waste years and millions on R&amp;D when you can just steal it?<p><a href="https:&#x2F;&#x2F;www.cbsnews.com&#x2F;news&#x2F;chinese-hackers-took-trillions-in-intellectual-property-from-about-30-multinational-companies&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cbsnews.com&#x2F;news&#x2F;chinese-hackers-took-trillions-...</a>
评论 #32601224 未加载
评论 #32601290 未加载
greatgibover 2 years ago
&quot;engaged a leading cybersecurity and forensics firm.&quot;<p>This is the current trend each time there is a breach: let&#x27;s pretend&#x2F;show that we are serious and waste money taking &quot;security&quot; consultants, that will in the end probably tell us obvious things.<p>Pay more or listen to your own employees instead and eventually go hire competent engineers instead of funding bullshit jobs.<p>Lastpass is supposed to be in the &quot;cyber security&quot; field, so it is a little bit ridiculous to say that you need external help on this subject...
评论 #32607420 未加载
评论 #32607109 未加载
aborsyover 2 years ago
Suppose that LastPass is compromised. What can an attacker do? Passwords are encrypted, with keys on users’ side.<p>Short of serving customers malicious JS code or an app to steal passwords, the production environment referred in the article can be made totally public, without secrets in vaults bring revealed, no?
评论 #32600254 未加载
评论 #32600642 未加载
FridgeSealover 2 years ago
I wonder if this is a “precursor” attack to the likes of a solar-winds style compromise?<p>Get into their dev env (ideally unnoticed), exfiltrate the sensitive code you need, poke around their systems. Once you’ve got a handle on their code and have figured out what to add, do so and just begin the waiting game.<p>Maybe that’s all happened, and this attack is “air cover” for the last-stage.
评论 #32601779 未加载
martinky24over 2 years ago
<a href="https:&#x2F;&#x2F;blog.lastpass.com&#x2F;2022&#x2F;08&#x2F;notice-of-recent-security-incident&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.lastpass.com&#x2F;2022&#x2F;08&#x2F;notice-of-recent-security-...</a><p>Not good! All a password manager sells is trust. Without that they don&#x27;t offer anything of value.
lawgimenezover 2 years ago
I liked how I was reading in the middle of the paragraph a &quot;subscribe to our newsletter&quot; popped up. It threw me off my rhythm. Clever.
评论 #32602174 未加载
MikeKusoldover 2 years ago
If you&#x27;re looking to move off of LastPass, and your company has a 1Password Business subscription, then you can get a free Family Account.<p>All your data is kept separate from the company, and if you depart you just need to add a credit card.<p><a href="https:&#x2F;&#x2F;support.1password.com&#x2F;link-family&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.1password.com&#x2F;link-family&#x2F;</a>
whoisjohnkidover 2 years ago
Hmm, even though LastPass doesn’t have access to your pass, couldn’t a malicious software update cause attacker to view your passwords when it runs since the software ultimately has access?<p>This doesn’t seem to be the case in this incident though.
评论 #32601054 未加载
评论 #32602553 未加载
评论 #32600925 未加载
评论 #32601814 未加载
aceazzameenover 2 years ago
I&#x27;m so glad we switched from LastPass to Bitwarden earlier this year. It seems like every few years there&#x27;s some kind of breach with LastPass.
评论 #32603335 未加载
tylervigenover 2 years ago
Incident impact and response seems adequate to me. Obviously I’d prefer no incidents, but this with the right layers of security in place to prevent out from impacting users and transparent reporting are the next best thing.
xenagoover 2 years ago
Not really a big worry, thanks to zero knowledge encryption. Glad it was disclosed. Probably not a fun time over there right now lol
bearjawsover 2 years ago
This is definitely a better example of handling a breach, many others would disclose this years later (if at all) since nothing material has happened or is known to have happened.<p>We&#x27;re looking at you Twitter &#x2F; GitHub
niros_valtosover 2 years ago
I like the way then handle the communication about the incident. There 2 ways to interpret the message: 1. Someone managed to get access to dev credentials and exfiltrated source code (the part that is explicitly mentioned). 2. Someone managed to push code on behalf of the compromised account and they responded to this change (not mentioned, but otherwise how would they know the account was compromised - each SCM has its logging limitations).
jrm4over 2 years ago
For all of its warts, at least crypto has managed to come up with a clever little motto that correctly states the issue, in the form of &quot;not your keys, not your crypto.&quot;<p>Putting your passwords in the hands of a third party <i>drastically</i> increases your threat surface and no amount of hand-wavy &quot;but it&#x27;s not as convenient&quot; will change this fact.<p>Now, it may be true that the convenience factor is very strong right now, but the solution will never be &quot;let&#x27;s keep hoping real hard that the third parties are good at this.&quot; Not unless any of the third parties are willing to take on indemnification or liability.<p>The proper thing to do is to figure out how we can best empower people on their own. I know it&#x27;s difficult, but that doesn&#x27;t fundamentally cut into the fact that &quot;this is what SHOULD be done.&quot;
评论 #32600603 未加载
评论 #32601658 未加载
评论 #32603245 未加载
评论 #32600471 未加载
评论 #32600494 未加载
larrybudover 2 years ago
I wish they were more definitive as to if there was (or was not) any compromise of the source code repository credentials. Eg could the attacker have injected malware into the code as in the Solarwinds incident?
评论 #32602530 未加载
alexeizover 2 years ago
I&#x27;ve switched to Bitwarden after the first of such incidents and never looked back. More incidents were just bound to happen to LastPass.
niros_valtosover 2 years ago
LastPass did very well! Here’s why: <a href="https:&#x2F;&#x2F;www.arnica.io&#x2F;blog&#x2F;a-first-look-at-lastpass-security-incident-notification" rel="nofollow">https:&#x2F;&#x2F;www.arnica.io&#x2F;blog&#x2F;a-first-look-at-lastpass-security...</a>
Aicyover 2 years ago
Thanks for reminding me to delete my lastpass acount.<p>I switched over to a self hosted bitwarden, and not only is the user experience a lot better, I&#x27;ve got better security confidence since my password store never leaves my home network.
评论 #32615172 未加载
robertwt7over 2 years ago
there might not be an impact straightaway, however gaining access to source code means that it&#x27;s easier for hacker to find loophole is it not?<p>lastpass has to be ready for some sort of attacks I guess, it&#x27;s good that they identified this early
评论 #32603055 未加载
dehrmannover 2 years ago
Didn&#x27;t we decide to move off LastPasss 5 years ago?
koheripbalover 2 years ago
Access to a dev account means they might have pushed out a malicious code update.<p>Huge huge potential loss here for people until they affirm this didn&#x27;t happen.
theshrike79over 2 years ago
I switched providers the last time this happened, or was it the one before that.<p>Not a good look for an online password storage service.
评论 #32601853 未加载
评论 #32600496 未加载
评论 #32615154 未加载
psygandhiover 2 years ago
Self-host with Bitwarden I guess?
DreamFlasherover 2 years ago
Wouldn&#x27;t have happened with Bitwarden ;)
评论 #32600536 未加载
评论 #32601053 未加载