By
Nick Reed
January 13, 2023
•
2
min read

On December 22, 2022, popular password manager LastPass issued a notice of a recent security incident. A threat actor obtained information from LastPass backups that contained personally identifiable information (PII) in plaintext, as well as encrypted copies of customer password vaults. This incident is a continuation of the August 2022 incident, where an unauthorized party gained access to the LastPass development environment through a compromised developer account. The scope of the incident has continued to escalate since August leaving many users concerned about their data.
The answer is complex; user data is only as secure as the master password used for vault protection. LastPass utilizes a zero-knowledge security model, which means plaintext master passwords are not known by LastPass, as all master passwords are stored with encryption. LastPass uses a strong encryption method that is equivalent to other industry leaders in password management. Encrypted fields are secured with 256-bit AES encryption that is decrypted with the unique key derived from each user’s master password.
Users who did not implement unique and complex passwords are at risk of compromise and should be concerned about the breach. Upon password creation, LastPass lays out their recommended password requirements that would make a password extremely difficult to crack.

In addition, it is best practice to prevent password reuse, and to use separate unique passwords for each individual account. Using a password generator can help take the guess work out of creating unique complex password.
Above is a quick guide from Hive Systems to estimate how long it would take to crack a password. Notice the impact small changes in password complexity can have on the time to brute force. Simply increasing to twelve characters from eleven under the upper and lowercase letter column shifts the brute force time from five months to twenty-four years.
The plaintext information exposed in the breach also poses a significant security risk and should not be discounted. Although the exposed plaintext items listed below include common information that is available online, the aggregate of this information can be used to provide greater detail for phishing attempts. Website URLs provide context for what the usernames and passwords log in to, allowing for highly customized phishing attempts.
Plaintext customer information exposed in the breach includes the following data types:
Although it is too late to alter the master password since the attackers have offline encrypted versions of customer vaults, it is still important to ensure your current vault password maintains high complexity. Users that have particularly weak master passwords should change the passwords stored inside their vault. If the master password hash is cracked the passwords stored in the offline vault copy held by the attackers will be invalid, thus providing protection. Accounts that are most sensitive should be prioritized for password changes, followed by accounts with the weakest passwords. Be sure to also have multifactor authentication enabled on as many accounts as possible for an added layer of security.
It should be noted that not all LastPass accounts were encrypted with the latest encryption standard. Older accounts may be encrypted with fewer interactions and are not as secure if the master password has not been changed recently. If a user’s master password is several years old, it is recommended to change all passwords stored in the vault.
Many media outlets are urging users to stop using LastPass due to its recent security issues. Over the years, many password managers have experienced security problems, but these issues have been too quickly forgotten. There is no doubt that a data breach is particularly impactful to customers, and that the user information stored in plaintext is a security failure by LastPass. However, their encryption is formidable if users have maintained a strong master password, their platform is still user friendly, convenient, and it comes at a competitive price point.
Below, several security issues that add context to the password manager security environment are listed. No solution is without flaws, but some shortcomings are certainly more egregious than others. There are password manager options available with better security track records than LastPass and zero recorded breaches. It will be difficult for LastPass to rebuild consumer trust, and it is reasonable to consider transitioning to another password manager if you are looking for the best password security solution.
LastPass’s communication regarding the breach has been vague and infrequent so far, causing customer confidence in the brand to waver. Upon suspicion of a security event, LastPass immediately launched an investigation, engaging the cyber security firm Mandiant and informing law enforcement and regulatory authorities. In the wake of the breach, they have added additional logging and alerting capabilities, eradicated access to the development accounts, and hardened those machines. They are supplementing endpoint security and analyzing every account with signs of suspicious activity. As they continue to investigate, they are committed to keeping customers informed.
Users should expect changes to the way plaintext data is handled by not only LastPass, but the entire password manager market. This has been a valuable lesson for the industry to ensure all customer data remains confidential, and that master passwords have enforced complexity upon creation.
Sources
https://nakedsecurity.sophos.com/2022/12/23/lastpass-finally-admits-they-did-steal-your-password-vaults-after-all/https://www.techrepublic.com/article/improper-password-managers-leaves-vulnerable-theft/https://www.securitymagazine.com/articles/89887-new-vulnerabilities-found-in-top-password-managers
https://www.pcmag.com/opinions/lastpass-didnt-expose-your-passwords
https://www.hackread.com/kaspersky-password-manager-bruteforce-attack/
https://www.hivesystems.io/blog/are-your-passwords-in-the-green

Audit. Security. Assurance.
IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.
Contact Info
OCD Tech
25 BHOP, Suite 407, Braintree MA, 02184
844-623-8324
https://ocd-tech.com
Follow Us
Videos
Check Out the Latest Videos From OCD Tech!
Services
SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®
IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review
IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO