Everything You Need To Know About The LastPass Breach

Did you hear? In late 2022, password manager service provider LastPass disclosed a major breach of customer information.
Even though this breach did not give the hacker direct access to passwords in detail, they did manage to steal a great deal of user data. That’s why LastPass users need to understand the details of the breach, what it means for their security, and what steps they need to take right away to mitigate the effects of the incident.

A Brief On LastPass’s Investigation

According to LastPass’s report on the breach:

“Based on our investigation to date, we have learned that an unknown threat actor accessed a cloud-based storage environment leveraging information obtained from the incident we previously disclosed in August of 2022. While no customer data was accessed during the August 2022 incident, some source code and technical information were stolen from our development environment and used to target another employee, obtaining credentials and keys which were used to access and decrypt some storage volumes within the cloud-based storage service. “

In other words, the full extent of the damage caused by an initial security incident in August 2022 has now been realized. A hacker gained access to key internal code and technical information, targeted LastPass again, and then gained access to user information.

What Information Was Exposed In The Breach?

  1. Encrypted password vaults
  2. Customer names
  3. Customer email addresses
  4. Customer phone numbers
  5. Customer billing information

The one silver lining in this incident is that customer password vaults are stored in a “proprietary binary format”, which is partially encrypted. That means these passwords are still not immediately accessible by the hacker and require the customer’s master password to unlock.

However, the hacker may have means of getting around this final layer of security. They may be able to employ brute force methods to guess the user’s master password and then decrypt the vault data they stole.

How Does This Breach Affect LastPass Users?

This breach largely compromises your security as a LastPass user. The hacker may have all the information they need to begin either brute-force hacking your master password, or phishing you as a target to gather further information.

All that stands between the hacker and your vault full of passwords is your master password. If it is not secure, or if you fall for a phishing scam, you may compromise your entire list of passwords.

What Action Should You Take Right Now?

Change Your Master Password

Your most pressing course of action is to immediately update your master password. Make sure to follow the best practices for creating a strong password:

  1. At least eight characters
  2. Include upper case and lower case characters
  3. Include numbers and symbols
  4. Avoid sequential strings of letters or numbers (“abc”, “123”, etc.)

Ready to put your password to the test?

It’s one thing to skim over a list of common password mistakes and assume you’re probably still OK.  Sure, maybe that one password is based on your pet’s name, or maybe that other password doesn’t have any capitals or numbers—what’s the big deal, really?

If you’re so confident, then why not put it to the test?

Click here to test how secure your password is—take a few minutes and try a few.

Enable 2-Factor Authentication

2FA requires the user to utilize two methods to confirm that they are the rightful account owner.

With a 2FA solution, you can enroll new employee devices in minutes, given that there’s no need to install an endpoint agent.

>Here’s how it works:

 

  • User logs into the session with primary credentials.
  • The session host validates credentials.
  • Then, it sends credential validation to the cloud via the login app.
  • The 2FA client sends its secondary authentication to the user. User approves.
  • The 2FA client sends approval back to the session host via the login app.
  • The user accesses their session very securely.

Essentially, with 2FA enabled, the hacker will need more than your master password to access your vault; they would also need access to your smartphone. It’s an essential and highly-secure second layer of security.

Why Is Password Management Important?

Despite the fact that passwords are the most direct way to access a user’s private information, most passwords in use today are not considered to be strong or complex enough—and even if they are, they aren’t updated often enough.

In fact, 90% of users have 50 or more online accounts, many of which rely on weak and shared passwords.

Different sites, apps, and programs have different requirements for what your password needs to have—minimum character length, capitalization, numbers, and symbols being the most common. 

The idea here being the more complex a password is, the harder it is for a hacker to crack it. This can be difficult to maintain—but it’s vitally important that you manage it…

Passwords protect email accounts, banking information, private documents, administrator rights and more—and yet, user after user continues to make critical errors when it comes to choosing, protecting and managing their passwords.

Make Sure You’re Secure

The primary lesson to learn here is that no security system is 100% foolproof. Even cybersecurity giants like LastPass will get hit from time to time.

It’s up to users like you to stay up to date on incidents like this, and act fast to update passwords and maintain personal security.

IT Companies in Raleigh

Download Our

IT Company in Raleigh

On What Questions You Need To Ask Before Signing Any Agreement.

Raleigh IT Support

Latest Tweets