by marconey on 8/25/22, 7:15 PM with 130 comments
by autoexec on 8/25/22, 7:28 PM
> we have seen no evidence that this incident involved any access to customer data or encrypted password vaults.
One way to prevent risk to your passwords in the event of a security breach is to not store them in the cloud at all. KeePass is great!
by mancini0 on 8/25/22, 10:19 PM
by m4jor on 8/25/22, 10:58 PM
I'm guessing nation-state because it seems they stole some source code/R&D. I'd guess China. That's their entire MO. Further the Chinese economy by any means necessary. Why waste years and millions on R&D when you can just steal it?
https://www.cbsnews.com/news/chinese-hackers-took-trillions-...
by greatgib on 8/26/22, 8:22 AM
This is the current trend each time there is a breach: let's pretend/show that we are serious and waste money taking "security" consultants, that will in the end probably tell us obvious things.
Pay more or listen to your own employees instead and eventually go hire competent engineers instead of funding bullshit jobs.
Lastpass is supposed to be in the "cyber security" field, so it is a little bit ridiculous to say that you need external help on this subject...
by aborsy on 8/25/22, 7:44 PM
Short of serving customers malicious JS code or an app to steal passwords, the production environment referred in the article can be made totally public, without secrets in vaults bring revealed, no?
by FridgeSeal on 8/25/22, 11:05 PM
Get into their dev env (ideally unnoticed), exfiltrate the sensitive code you need, poke around their systems. Once you’ve got a handle on their code and have figured out what to add, do so and just begin the waiting game.
Maybe that’s all happened, and this attack is “air cover” for the last-stage.
by martinky24 on 8/25/22, 9:10 PM
Not good! All a password manager sells is trust. Without that they don't offer anything of value.
by lawgimenez on 8/26/22, 12:21 AM
by MikeKusold on 8/25/22, 10:34 PM
All your data is kept separate from the company, and if you depart you just need to add a credit card.
by whoisjohnkid on 8/25/22, 10:41 PM
This doesn’t seem to be the case in this incident though.
by aceazzameen on 8/26/22, 4:06 AM
by tylervigen on 8/25/22, 10:41 PM
by xenago on 8/25/22, 7:54 PM
by bearjaws on 8/25/22, 7:41 PM
We're looking at you Twitter / GitHub
by niros_valtos on 8/25/22, 8:12 PM
by jrm4 on 8/25/22, 9:58 PM
Putting your passwords in the hands of a third party drastically increases your threat surface and no amount of hand-wavy "but it's not as convenient" will change this fact.
Now, it may be true that the convenience factor is very strong right now, but the solution will never be "let's keep hoping real hard that the third parties are good at this." Not unless any of the third parties are willing to take on indemnification or liability.
The proper thing to do is to figure out how we can best empower people on their own. I know it's difficult, but that doesn't fundamentally cut into the fact that "this is what SHOULD be done."
by larrybud on 8/25/22, 9:10 PM
by alexeiz on 8/26/22, 6:39 AM
by niros_valtos on 8/26/22, 5:46 PM
by Aicy on 8/26/22, 3:02 PM
I switched over to a self hosted bitwarden, and not only is the user experience a lot better, I've got better security confidence since my password store never leaves my home network.
by robertwt7 on 8/26/22, 3:29 AM
lastpass has to be ready for some sort of attacks I guess, it's good that they identified this early
by dehrmann on 8/26/22, 2:19 AM
by koheripbal on 8/25/22, 10:38 PM
Huge huge potential loss here for people until they affirm this didn't happen.
by theshrike79 on 8/25/22, 9:45 PM
Not a good look for an online password storage service.
by psygandhi on 8/26/22, 10:25 AM
by DreamFlasher on 8/25/22, 10:03 PM