Dec. 23rd, 2022 Update 2:
Naked Security has this article detailing their take on the LastPass breach and admission that encrypted vaults were stolen. They have some helpful comments and insights. This got CyberHoot thinking some more…
We stored our Credit Card information in LastPass for Form Filling ease of use. Will we cancel and re-issue our credit cards? Speaking personally now, I will not. My Master Password was so long and complex that the cracking effort required according to this website’s Password Strength Meter was: 7 quadrillion years whew! That’s a relief.
Dec. 23rd 2022: CyberHoot LastPass Breach Update:
LastPass released new information on their latest breach announcement from Nov. 30th in which their monitoring identified a new breach (tied to their Aug. breach). In this update from 12/22/2022 they admit that they believe 256 bit AES encrypted client password vaults were stolen from the 3rd party. This is the first time they’ve acknowledged that client data was at risk. Here’s their take on the situation:
Dec. 22nd, LastPass Blog Update:
“If you use the default settings above, it would take millions of years to guess your master password using generally-available password-cracking technology. Your sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture. There are no recommended actions that you need to take at this time.
However, it is important to note that if your master password does not make use of the defaults above, then it would significantly reduce the number of attempts needed to guess it correctly. In this case, as an extra security measure, you should consider minimizing risk by changing passwords of websites you have stored.”
So, what does this mean for all you LastPass users out there, or for Companies that have deployed LastPass to their Users? A lot of work actually.