Forum menu
It gets worse for l...
 

It gets worse for lastpass...hacked again!

Posts: 2086
Free Member
Topic starter
 
[#12741369]

Following the colossal cock-up the other month, Lastpass have again been hacked.

This time through a media centre (allegedly Plex) running on a senior devops engineers home workstation 😀👌
Plex was exploited and a keylogger installed on the workstation. This allowed the hacker to capture the login details for a 'master' Lastpass account, which had the login details for their Amazon S3 bucket. This contained critical data.

https://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/

For those not versed in the boring world of IT security, allowing random 3rd party software to be installed on any PC with access to a company network would be considered amateur hour, even for a small company. But for a well known security software company of the scale and public awareness of LastPass to fail even this basic level of security, let alone one of their senior devops engineers is honestly mind blowing.

Another point is that their own intrusion detection and log monitoring failed to detect this, instead Amazon's alerts is how they came to be aware of the hack.


 
Posted : 01/03/2023 3:21 pm
leffeboy reacted
 StuF
Posts: 2099
Free Member
 

It sounds like the sort of thing that Multi Factor Auth would have prevented


 
Posted : 01/03/2023 3:26 pm
Posts: 20884
Free Member
 

I particularly like how their own press release tries to shift blame on to third-parties...

'Neither incident was caused by any LastPass product defect or unauthorized access to – or abuse of – production systems. Rather, the threat actor exploited a vulnerability in third-party software, bypassed existing controls, and eventually accessed non-production development and backup storage environments.'

But this happened in YOUR environment LastPass you should have controls in place.


 
Posted : 01/03/2023 3:27 pm
Posts: 2086
Free Member
Topic starter
 

StuF
Full Member

It sounds like the sort of thing that Multi Factor Auth would have prevented
Posted 10 seconds ago

Actually they were using MFA, but that was captured by the keylogger as well. I can only guess the attacker used it immediately?


 
Posted : 01/03/2023 3:28 pm
 IHN
Posts: 20127
Full Member
 

Rather, the threat actor exploited a vulnerability in

... your poor control of software installation on your machines.


 
Posted : 01/03/2023 3:31 pm
Posts: 20884
Free Member
 

I can't quite believe how this was ever allowed to happen. We run a small development agency and all required apps are installed remotely by an admin. Nobody (without access to admin rights) could even install something like Plex onto their laptop. How on earth were LastPass even in a position where an employee was able and/or allowed to install Plex on a work machine?


 
Posted : 01/03/2023 3:37 pm
Posts: 12888
Free Member
 

Not great for Plex either or anyone using it - apparently they have no idea what the vulnerability is so can’t patch it! And LastPass not being helpful 😂


 
Posted : 01/03/2023 3:42 pm
Posts: 20884
Free Member
 

I assume this will only effect users of Plex that have downloaded a media server to their machine, not people using a browser to access a Plex server?


 
Posted : 01/03/2023 3:49 pm
 xora
Posts: 957
Full Member
 

<div class="bbp-reply-content">

Actually they were using MFA, but that was captured by the keylogger as well. I can only guess the attacker used it immediately?

</div>

I beleive like most of the password managers you can store the MFA key in the lastpass wallet. So once thats been compromised thats game over for MFA!


 
Posted : 01/03/2023 3:53 pm
Posts: 20884
Free Member
 

They need YubiKeys (that's what we are enforcing next).


 
Posted : 01/03/2023 3:59 pm
StuF reacted
Posts: 18196
Full Member
 

So what to do as a Lastpass account holder?
Will deleting the account protect anything now?


 
Posted : 01/03/2023 4:02 pm
 IHN
Posts: 20127
Full Member
 

I can’t quite believe how this was ever allowed to happen. We run a small development agency and all required apps are installed remotely by an admin. Nobody (without access to admin rights) could even install something like Plex onto their laptop. How on earth were LastPass even in a position where an employee was able and/or allowed to install Plex on a work machine?

Indeed. Incredible.


 
Posted : 01/03/2023 4:04 pm
Posts: 2086
Free Member
Topic starter
 

kayak23
Full Member

So what to do as a Lastpass account holder?
Will deleting the account protect anything now?

Change all your passwords (ideally).

However it depends on a few things how vulnerable you are.

If your account was old, it may have been set up incorrectly (by lastpass). Basically they defaulted to a weak encryption setting (low iterations) and never upgraded people once they realised.

So if your account is more than a few years old, it is potentially more vulnerable.

It also depends how strong your password was.

Thirdly, I've read that the sites you had saved were leaked in plain text. Therefore it is easy for the hacker to know what your passwords were for. If you had banking/crypto/anything with immediate access to money stored, I would think you are likely to be more of a target.


 
Posted : 01/03/2023 4:10 pm
Posts: 0
Free Member
 

Not great for Plex either or anyone using it – apparently they have no idea what the vulnerability is so can’t patch it! And LastPass not being helpful 😂

Their blame detection and prevention isn't good enough?

Happy enough to accept their might be a plex issue but the hurry to pass the buck coupled with LastPass not being overly helpful does pang very much of "Wtaf has happened? We don't know but incidentally plex has been installed on that machine and shouldn't have. Yep that'll do, all plex's fault"


 
Posted : 01/03/2023 4:10 pm
Posts: 3194
Free Member
 

all required apps are installed remotely by an admin

Maybe the hacked employee was an admin.


 
Posted : 01/03/2023 4:13 pm
Posts: 20884
Free Member
 

Maybe the hacked employee was an admin.

Then their own security measures were dreadful and they clearly weren't listening during the internet safety training / online security sessions that LastPass must have undertaken (and officially logged) in order to get the ISO27001 certification that they got on 27 July 2022.


 
Posted : 01/03/2023 4:19 pm
Posts: 12888
Free Member
 

Happy enough to accept their might be a plex issue but the hurry to pass the buck
well, according to the article, the Plex-blaming [I]isn't[/I] the official line from LP but from an anonymous source... could also be an unofficial-official "leak" though of course...

It also mentions Plex themselves were breached soon after, whether it's linked or not no-one knows but a lot of customer data was taken. I had been using Plex since the Xbox Media Centre days but binned them off some time ago, didn't like the direction it was headed in (trying to become some kind of international media conglomerate!)


 
Posted : 01/03/2023 4:23 pm
 IHN
Posts: 20127
Full Member
 

Maybe the hacked employee was an admin.

Any installations here are rolled out to the user via AD Groups/Group Policy. No-one actually logs into a machine and installs software, Admin or not.


 
Posted : 01/03/2023 4:24 pm
Posts: 0
Free Member
 

They need YubiKeys (that’s what we are enforcing next).

It’s extremely trivial to steal the certificate and use using Mimikatz btw.


 
Posted : 01/03/2023 4:30 pm
Posts: 2423
Free Member
 

Ouch! DevOps = 50% Dev + 50% Ops + 0% SecOps. Why is a senior developer using their home computer to access company files?


 
Posted : 01/03/2023 4:42 pm
Posts: 20884
Free Member
 

Why is a senior developer using their home computer to access company files?

Or installing unauthorised software onto a company device.


 
Posted : 01/03/2023 4:46 pm
Posts: 10336
Full Member
 

But for a well known security software company of the scale and public awareness of LastPass to fail even this basic level of security, let alone one of their senior devops engineers is honestly mind blowing.

Yikes.  There are some people I would understand doing this but if your senior devops stuff don't automatically know that this is wrong then you have an issue.  Time to jump ship I think

The hacked DevOps engineer was one of only four LastPass employees with access to the corporate vault. Once in possession of the decrypted vault, the threat actor exported the entries, including the “decryption keys needed to access the AWS S3 LastPass production backups, other cloud-based storage resources, and some related critical database backups.”

1 of only four.  Absolutely no excuse for not being aware of the possibilities


 
Posted : 01/03/2023 5:12 pm
Posts: 2423
Free Member
 

Sure, although the article relates that the hack involved the compromise of the employee’s home computer.
(Reply to JohnDoh)


 
Posted : 01/03/2023 5:12 pm
Posts: 1993
Full Member
 

Lol, some major reading fail by some of the posters here...


 
Posted : 01/03/2023 5:52 pm
 StuF
Posts: 2099
Free Member
 

They need YubiKeys (that’s what we are enforcing next).

It’s extremely trivial to steal the certificate and use using Mimikatz btw.

The private keys of the key pair are held only on the yubikey for FIDO authentication so would be tricky to get to those with Mimikatz unless Mimikatz just gets the authorization token once authentication has taken place


 
Posted : 01/03/2023 5:57 pm
Posts: 20884
Free Member
 

Sure, although the article relates that the hack involved the compromise of the employee’s home computer.

Ahh right - I missed that bit. Either way it was a pretty major screw-up though.


 
Posted : 01/03/2023 6:07 pm
Posts: 11631
Free Member
 

So where would the liability be if this led to a fraudulent transaction. Would you have been deemed to have shared a personal password with a 3rd party (lastpass) or is it a given that you stored the password safely (like writing it down and locking it in a drawer)


 
Posted : 01/03/2023 6:31 pm
Posts: 5828
Full Member
 

Ok well as this seems that the breach was to be from last August, hopefully i don't need to change my passwords again.
Might look at changing provider though, any suggestions?


 
Posted : 01/03/2023 6:35 pm
Posts: 13349
Free Member
 

1Password would be my preferred app for a replacement. It's not going to be fun if you've lots of passwords though!

1Password does everything with no added extras required. You may need to check that your preferred cloud storage will allow the vault to be stored online.


 
Posted : 01/03/2023 8:09 pm
Posts: 6289
Full Member
 

I tend to go with the theory that they are probably safer than most now as they will be super vigilant. But despite reading this thread and the various statements from LastPass I still can’t tell if my passwords are actually at risk from any of this or not. I’ve changed the master one to something so random I had to write it down somewhere😀 changed the number of iterations to 600000 and changed the passwords for anything with financial information. Hopefully that is enough.


 
Posted : 01/03/2023 8:10 pm
Posts: 5149
Full Member
 

Oh joy, that's a good chunk of tomorrow taken care of 🙁


 
Posted : 01/03/2023 8:18 pm
Posts: 5054
Free Member
 

FWIW my job is supplier assurance with a Bank, we use LastPass but as the assurance is 'owned' at Group level it's not me that's missed anything 🙂

For the record, I don't use password vaults myself, neither professional nor privately.


 
Posted : 01/03/2023 9:28 pm
Posts: 3329
Full Member
 

As per @grahamt1980 looks like I don't need to change all my passwords again. At least.

Already done that for anything important after the first announcement and also switched on MFA for any service that offered it.

When I heard about the first breach I took a look at 1Password - looked a pain to use, particularly on mobile.

Was giving LastPass the benefit of the doubt but think I will probably be moving elsewhere. You might think they would be more vigilant but unfortunately problems like this are often culture related (rushing/cutting corners) and/or they've dug themselves a hole of technical debt and are struggling to keep up with.

Failing to adequately secure your backups, when those backups contain all the Crown Jewels, and also your whole business is as an infosec company, is very very shoddy


 
Posted : 01/03/2023 11:40 pm
 Aidy
Posts: 2977
Free Member
 

I can’t quite believe how this was ever allowed to happen. We run a small development agency and all required apps are installed remotely by an admin.

I think that's pretty uncommon outside of Windows shops.


 
Posted : 02/03/2023 12:11 am
 Aidy
Posts: 2977
Free Member
 

“The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault.”

Hmm... that doesn't make much sense though.

They know what the vault's password is, after the employee has auth'd with MFA - but so what? MFA should still prevent the attacker from accessing the vault, that's... the point of MFA. Just because the employee has auth'd with MFA doesn't mean someone else gets to login without MFA.

This doesn't feel like the whole story.


 
Posted : 02/03/2023 12:20 am
Posts: 20884
Free Member
 

Password would be my preferred app for a replacement. It’s not going to be fun if you’ve lots of passwords though!

you can export a password file from LastPass and import it directly into 1Password - that’s what we did. It only takes a couple of minutes.


 
Posted : 02/03/2023 8:28 am
Posts: 3102
Full Member
 

Dashlane any good as a password manager?


 
Posted : 02/03/2023 8:34 am
 Drac
Posts: 50598
 

Keeping the same passwords as the possible compromised ones?


 
Posted : 02/03/2023 8:36 am
Posts: 20884
Free Member
 

Keeping the same passwords as the possible compromised ones?

That's up to the user, but it is very easy to then go through and change individual passwords with a couple of clicks in 1Password.


 
Posted : 02/03/2023 8:44 am
Posts: 5828
Full Member
 

I'm fighting that i changed mine last month after the previous thread, and the issue in this one was last year so i shouldn't need to change them again.
Have done all the other recommended actions so will export at some point. Just need to decide which one to move to


 
Posted : 02/03/2023 8:49 am
Posts: 2874
Free Member
 

That reminds me, I'm going to stop that annoying hacker who keeps editing my STW posts.

EDIT: No you won't


 
Posted : 02/03/2023 9:13 am
Posts: 3329
Full Member
 

you can export a password file from LastPass and import it directly into 1Password – that’s what we did. It only takes a couple of minutes.

Just to make it entirely clear to everyone, moving password manager does not protect you from the breach if you are/were using LastPass. YOU STILL NEED TO GO AND CHANGE ALL YOUR PASSWORDS!!!

I don't agree with the official LastPass stance that you don't need to. Although they say your passwords will still be encrypted in what the hacker got access to, you are assuming the encryption won't be cracked /taking last pass at their word that it was in fact encrypted.


 
Posted : 02/03/2023 10:28 am
Posts: 20884
Free Member
 

Just to make it entirely clear to everyone, moving password manager does not protect you from the breach if you are/were using LastPass. YOU STILL NEED TO GO AND CHANGE ALL YOUR PASSWORDS!!!

Yeah I did say in a later post that once the passwords are in 1Password, it is easy to update them to new secure passwords.


 
Posted : 02/03/2023 10:30 am
el_boufador reacted
Posts: 2086
Free Member
Topic starter
 

Aidy
Free Member

“The threat actor was able to capture the employee’s master password as it was entered, after the employee authenticated with MFA, and gain access to the DevOps engineer’s LastPass corporate vault.”

Hmm… that doesn’t make much sense though.

They know what the vault’s password is, after the employee has auth’d with MFA – but so what? MFA should still prevent the attacker from accessing the vault, that’s… the point of MFA. Just because the employee has auth’d with MFA doesn’t mean someone else gets to login without MFA.

This doesn’t feel like the whole story.

See xora's post, apparently you can use Lastpass to backup your MFA seed keys, therefore those were compromised also. From the LastPass PDF:

Backup of LastPass MFA/Federation Database – contained copies of LastPass Authenticator seeds, telephone numbers used for the MFA backup option (if enabled), as well as a split knowledge component (the K2 “key”) used for LastPass federation (if enabled). This database was encrypted, but the separately-stored decryption key was included in the secrets stolen by the threat actor during the second incident.

natrix
Free Member

That reminds me, I’m going to stop that annoying hacker who keeps editing my STW posts.

EDIT: No you won’t

🙂


 
Posted : 02/03/2023 10:30 am
 MSP
Posts: 15842
Free Member
 

The password vaults are individually encrypted, so it's not just a matter of cracking encryption for all users, they would have crack each users encryption separately. That is a massive undertaking.

However I am hugely disappointed by lastpass's communication around this issue, I don't think they have been honest with there user base, and left us trying to work out exacvtly what this hack has meant for our security, for that alone I am looking for an alternative.

How do others find alternatives handle passwords on iphones in plugging in with the system api?


 
Posted : 02/03/2023 10:35 am
el_boufador reacted
Page 1 / 4