TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

LastPass: Notice of Security Incident

315 点作者 marconey超过 2 年前

26 条评论

autoexec超过 2 年前
Not enough data to say what the impact of this is. Good for them disclosing it early while they investigate.<p>&gt; we have seen no evidence that this incident involved any access to customer data or encrypted password vaults.<p>One way to prevent risk to your passwords in the event of a security breach is to not store them in the cloud at all. KeePass is great!
评论 #32598803 未加载
评论 #32598852 未加载
评论 #32600361 未加载
评论 #32602461 未加载
评论 #32610343 未加载
评论 #32606174 未加载
评论 #32615141 未加载
mancini0超过 2 年前
Lesspass generates reproducible unique passwords from inputs (username, domain, masterpassword). It works without an internet connection and is open source. You only need their cloud storage if you want to backup metadata about the password requirements for specific sites (i.e, no special chars allowed by foo.com, bar.com requires a capital letter and a number, etc.) This metadata can also be stored locally. The command line utility is great, they also offer Mozilla &#x2F; chrome extensions and mobile apps. I bash alias the command line command to copy the password into clipboard so when I navigate to a site on my laptop, I run genp chase or genp amazon and quickly have the pw ready to go in my clipboard. The apps &#x2F; extensions and even the cli uses emojis as a visual cue to let you know you typed in the correct masterpassword (since it&#x27;s masked)
评论 #32602104 未加载
评论 #32601851 未加载
评论 #32601327 未加载
评论 #32601343 未加载
m4jor超过 2 年前
I wonder if this was nation-state backed hackers or just some rando.<p>I&#x27;m guessing nation-state because it seems they stole some source code&#x2F;R&amp;D. I&#x27;d guess China. That&#x27;s their entire MO. Further the Chinese economy by any means necessary. Why waste years and millions on R&amp;D when you can just steal it?<p><a href="https:&#x2F;&#x2F;www.cbsnews.com&#x2F;news&#x2F;chinese-hackers-took-trillions-in-intellectual-property-from-about-30-multinational-companies&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cbsnews.com&#x2F;news&#x2F;chinese-hackers-took-trillions-...</a>
评论 #32601224 未加载
评论 #32601290 未加载
greatgib超过 2 年前
&quot;engaged a leading cybersecurity and forensics firm.&quot;<p>This is the current trend each time there is a breach: let&#x27;s pretend&#x2F;show that we are serious and waste money taking &quot;security&quot; consultants, that will in the end probably tell us obvious things.<p>Pay more or listen to your own employees instead and eventually go hire competent engineers instead of funding bullshit jobs.<p>Lastpass is supposed to be in the &quot;cyber security&quot; field, so it is a little bit ridiculous to say that you need external help on this subject...
评论 #32607420 未加载
评论 #32607109 未加载
aborsy超过 2 年前
Suppose that LastPass is compromised. What can an attacker do? Passwords are encrypted, with keys on users’ side.<p>Short of serving customers malicious JS code or an app to steal passwords, the production environment referred in the article can be made totally public, without secrets in vaults bring revealed, no?
评论 #32600254 未加载
评论 #32600642 未加载
FridgeSeal超过 2 年前
I wonder if this is a “precursor” attack to the likes of a solar-winds style compromise?<p>Get into their dev env (ideally unnoticed), exfiltrate the sensitive code you need, poke around their systems. Once you’ve got a handle on their code and have figured out what to add, do so and just begin the waiting game.<p>Maybe that’s all happened, and this attack is “air cover” for the last-stage.
评论 #32601779 未加载
martinky24超过 2 年前
<a href="https:&#x2F;&#x2F;blog.lastpass.com&#x2F;2022&#x2F;08&#x2F;notice-of-recent-security-incident&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.lastpass.com&#x2F;2022&#x2F;08&#x2F;notice-of-recent-security-...</a><p>Not good! All a password manager sells is trust. Without that they don&#x27;t offer anything of value.
lawgimenez超过 2 年前
I liked how I was reading in the middle of the paragraph a &quot;subscribe to our newsletter&quot; popped up. It threw me off my rhythm. Clever.
评论 #32602174 未加载
MikeKusold超过 2 年前
If you&#x27;re looking to move off of LastPass, and your company has a 1Password Business subscription, then you can get a free Family Account.<p>All your data is kept separate from the company, and if you depart you just need to add a credit card.<p><a href="https:&#x2F;&#x2F;support.1password.com&#x2F;link-family&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.1password.com&#x2F;link-family&#x2F;</a>
whoisjohnkid超过 2 年前
Hmm, even though LastPass doesn’t have access to your pass, couldn’t a malicious software update cause attacker to view your passwords when it runs since the software ultimately has access?<p>This doesn’t seem to be the case in this incident though.
评论 #32601054 未加载
评论 #32602553 未加载
评论 #32600925 未加载
评论 #32601814 未加载
aceazzameen超过 2 年前
I&#x27;m so glad we switched from LastPass to Bitwarden earlier this year. It seems like every few years there&#x27;s some kind of breach with LastPass.
评论 #32603335 未加载
tylervigen超过 2 年前
Incident impact and response seems adequate to me. Obviously I’d prefer no incidents, but this with the right layers of security in place to prevent out from impacting users and transparent reporting are the next best thing.
xenago超过 2 年前
Not really a big worry, thanks to zero knowledge encryption. Glad it was disclosed. Probably not a fun time over there right now lol
bearjaws超过 2 年前
This is definitely a better example of handling a breach, many others would disclose this years later (if at all) since nothing material has happened or is known to have happened.<p>We&#x27;re looking at you Twitter &#x2F; GitHub
niros_valtos超过 2 年前
I like the way then handle the communication about the incident. There 2 ways to interpret the message: 1. Someone managed to get access to dev credentials and exfiltrated source code (the part that is explicitly mentioned). 2. Someone managed to push code on behalf of the compromised account and they responded to this change (not mentioned, but otherwise how would they know the account was compromised - each SCM has its logging limitations).
jrm4超过 2 年前
For all of its warts, at least crypto has managed to come up with a clever little motto that correctly states the issue, in the form of &quot;not your keys, not your crypto.&quot;<p>Putting your passwords in the hands of a third party <i>drastically</i> increases your threat surface and no amount of hand-wavy &quot;but it&#x27;s not as convenient&quot; will change this fact.<p>Now, it may be true that the convenience factor is very strong right now, but the solution will never be &quot;let&#x27;s keep hoping real hard that the third parties are good at this.&quot; Not unless any of the third parties are willing to take on indemnification or liability.<p>The proper thing to do is to figure out how we can best empower people on their own. I know it&#x27;s difficult, but that doesn&#x27;t fundamentally cut into the fact that &quot;this is what SHOULD be done.&quot;
评论 #32600603 未加载
评论 #32601658 未加载
评论 #32603245 未加载
评论 #32600471 未加载
评论 #32600494 未加载
larrybud超过 2 年前
I wish they were more definitive as to if there was (or was not) any compromise of the source code repository credentials. Eg could the attacker have injected malware into the code as in the Solarwinds incident?
评论 #32602530 未加载
alexeiz超过 2 年前
I&#x27;ve switched to Bitwarden after the first of such incidents and never looked back. More incidents were just bound to happen to LastPass.
niros_valtos超过 2 年前
LastPass did very well! Here’s why: <a href="https:&#x2F;&#x2F;www.arnica.io&#x2F;blog&#x2F;a-first-look-at-lastpass-security-incident-notification" rel="nofollow">https:&#x2F;&#x2F;www.arnica.io&#x2F;blog&#x2F;a-first-look-at-lastpass-security...</a>
Aicy超过 2 年前
Thanks for reminding me to delete my lastpass acount.<p>I switched over to a self hosted bitwarden, and not only is the user experience a lot better, I&#x27;ve got better security confidence since my password store never leaves my home network.
评论 #32615172 未加载
robertwt7超过 2 年前
there might not be an impact straightaway, however gaining access to source code means that it&#x27;s easier for hacker to find loophole is it not?<p>lastpass has to be ready for some sort of attacks I guess, it&#x27;s good that they identified this early
评论 #32603055 未加载
dehrmann超过 2 年前
Didn&#x27;t we decide to move off LastPasss 5 years ago?
koheripbal超过 2 年前
Access to a dev account means they might have pushed out a malicious code update.<p>Huge huge potential loss here for people until they affirm this didn&#x27;t happen.
theshrike79超过 2 年前
I switched providers the last time this happened, or was it the one before that.<p>Not a good look for an online password storage service.
评论 #32601853 未加载
评论 #32600496 未加载
评论 #32615154 未加载
psygandhi超过 2 年前
Self-host with Bitwarden I guess?
DreamFlasher超过 2 年前
Wouldn&#x27;t have happened with Bitwarden ;)
评论 #32600536 未加载
评论 #32601053 未加载