Connect with us

Technologies

What LastPass Subscribers Need to Do After the Latest Breach

Following the latest breach, you might want to find a new password manager.

LastPass, one of the world’s most popular password managers, is yet again under the microscope after its latest security breach.

In late December, LastPass CEO Karim Toubba acknowledged that a security incident the company first disclosed in August had ultimately paved the way for an unauthorized party to steal customer account information and vault data. This is the latest in a lengthy string of security incidents involving LastPass that date back to 2011.

It’s also the most alarming.

An unauthorized party now has access to unencrypted subscriber account information like LastPass usernames, company names, billing addresses, email addresses, phone numbers and IP addresses, according to Toubba. That same unauthorized party also has a copy of customer vault data, which includes unencrypted data like website URLs and encrypted data like the usernames and passwords for all the sites customers have saved in their vaults. If you’re a LastPass subscriber, the severity of this breach should have you looking for a different password manager because your passwords and personal data are at risk of being exposed.

What should LastPass subscribers do?

The company didn’t specify how many users were affected by the breach, and LastPass didn’t respond to CNET’s request for additional comment on the breach. But if you’re a LastPass subscriber, you need to operate under the assumption that your user and vault data are in the hands of an unauthorized party with ill intentions. Though the most sensitive data is encrypted, the problem is that the threat actor can run «brute force» attacks on those stolen local files. LastPass estimates it would take «millions of years» to guess your master password — if you’ve followed its best practices.

If you haven’t — or if you just want total peace of mind — you’ll need to spend some serious time and effort changing your individual passwords. And while you’re doing that, you’ll probably want to transition away from LastPass, too.

With that in mind, here’s what you need to do right now if you’re a LastPass subscriber:

1. Find a new password manager. Given LastPass’ history with security incidents and considering the severity of this latest breach, now’s a better time than ever to seek an alternative.

2. Change your most important site-level passwords immediately. This includes passwords for anything like online banking, financial records, internal company logins and medical information. Make sure these new passwords are strong and unique.

3. Change every single one of your other online passwords. It’s a good idea to change your passwords in order of importance here too. Start with changing the passwords to accounts like email and social media profiles, then you can start moving backward to other accounts that may not be as critical.

4. Enable two-factor authentication wherever possible. Once you’ve changed your passwords, make sure to enable 2FA on any online account that offers it. This will give you an added layer of protection by alerting you and requiring you to authorize each login attempt. That means even if someone ends up obtaining your new password, they shouldn’t be able to gain access to a given site without your secondary authenticating device (typically your phone).

5. Change your master password. Though this doesn’t change the threat level to the stolen vaults, it’s still prudent to help mitigate the threats of any potential future attack — that is, if you decide you want to stay with LastPass.

LastPass alternatives to consider

  • Bitwarden: CNET’s top password manager is a highly secure and open-source LastPass alternative. Bitwarden’s free tier allows you to use the password manager across an unlimited number of devices across device types. Read our Bitwarden review.
  • 1Password: Another excellent password manager that works seamlessly across platforms. 1Password doesn’t offer a free tier, but you can try it for free for 14 days.
  • iCloud Keychain: Apple’s built-in password manager for iOS, iPadOS and MacOS devices is an excellent LastPass alternative available to Apple users at no additional cost. iCloud Keychain is secure and easy to set up and use across all of your Apple devices. It even offers a Windows client, too, with support for Chrome and Edge browsers.

How did it come to this?

In August 2022, LastPass published a blog post written by Toubba saying that the company «determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information.»

At the time, Toubba said that the threat was contained after LastPass «engaged a leading cybersecurity and forensics firm» and implemented «enhanced security measures.» But that blog post would be updated several times over the following months as the scope of the breach gradually widened.

On Sept. 15, Toubba updated the blog post to notify customers that the company’s investigation into the incident had concluded.

«Our investigation revealed that the threat actor’s activity was limited to a four-day period in August 2022. During this timeframe, the LastPass security team detected the threat actor’s activity and then contained the incident,» Toubba said. «There is no evidence of any threat actor activity beyond the established timeline. We can also confirm that there is no evidence that this incident involved any access to customer data or encrypted password vaults.»

Toubba assured customers at the time that their passwords and personal data were safe in LastPass’s care.

However, it turned out that the unauthorized party was indeed ultimately able to access customer data. On Nov. 30, Toubba updated the blog post once again to alert customers that the company «determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information.»

Then, on Dec. 22, Toubba issued a lengthy update to the blog post outlining the unnerving details regarding precisely what customer data the hackers were able to access in the breach. It was then that the full severity of the situation finally came to light and the public found out that LastPass customers’ personal data was in the hands of a threat actor and all of their passwords were at serious risk of being exposed.

Still, Toubba assured customers who follow LastPass’s best practices for passwords and have the latest default settings enabled that no further action on their part is recommended at this time since their «sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture.»

However, Toubba warned that those who don’t have LastPass’s default settings enabled and don’t follow the password manager’s best practices are at greater risk of having their master passwords cracked. Toubba suggested that those users should consider changing the passwords of the websites they have stored.

What does all of this mean for LastPass subscribers?

The initial breach ended up allowing the unauthorized party to access sensitive user account data as well as vault data, which means that LastPass subscribers should be extremely concerned for the integrity of the data they have stored in their vaults and should be questioning LastPass’s capacity to keep their data safe.

If you’re a LastPass subscriber, an unauthorized party may have access to personal information like your LastPass username, email address, phone number, name and billing address. IP addresses used when accessing LastPass were also exposed in the breach, which means that the unauthorized party could also see the locations from which you used your account. And because LastPass doesn’t encrypt users’ stored website URLs, the unauthorized party can see all of the websites for which you have login information saved with the password manager (even if the passwords themselves are encrypted).

Information like this gives a potential attacker plenty of ammunition for launching a phishing attack and socially engineering their way to your account passwords. And if you have any password reset links stored that may still be active, an attacker can easily go ahead and create a new password for themselves.

LastPass says that encrypted vault data like usernames and passwords, secure notes and form-filled data that was stolen remains secured. However, if an attacker were to crack your master password at the time of the breach, they would be able to access all of that information, including all the usernames and passwords to your online accounts. If your master password wasn’t strong enough at the time of the breach, your passwords are especially at risk of being exposed.

Changing your master password now will, unfortunately, not help solve the issue because the attackers already have a copy of your vault that was encrypted using the master password you had in place at the time of the breach. This means the attackers essentially have an unlimited amount of time to crack that master password. That’s why the safest course of action is a site-by-site password reset for all of your LastPass-stored accounts. Once changed at the site level, that would mean the attackers would be getting your old, outdated passwords if they managed to crack the stolen encrypted vaults.

For more on staying secure online, here are data privacy tips digital security experts wish you knew and browser settings to change to better guard your information.

Technologies

Verum Messenger: Data Protection at Its Finest

Verum Messenger positions itself as a tool for those who value privacy and security above all.

Verum Messenger stands out from other messengers thanks to its approach to security, anonymity, and innovations in communication. 

Here are some key aspects that highlight its uniqueness:

  • Default encryption: Verum Messenger uses end-to-end (E2E) encryption for all chats, meaning messages are encrypted on the sender’s device and decrypted only on the recipient’s device. This makes it impossible for third parties, including app developers, to access the content of the messages.
  • Anonymity: When registering with Verum, there’s no need to provide a phone number or email. Users simply choose a nickname and password, significantly enhancing their level of anonymity. This contrasts with many other messengers, where anonymity can be compromised through linked personal data.
  • Built-in VPN: An additional layer of protection that hides the user’s IP address, making their location and internet activity less trackable.
  • Data control: Users can set messages to be automatically deleted after a specified time, ranging from a few seconds to a week. There’s also a quick deletion feature for all chats, calls, and even contacts, which is useful for maintaining privacy.
  • Large groups: The ability to create chat rooms with up to 10,000 participants makes Verum attractive for organizing large events, discussions, or communities while maintaining a high level of security.
  • Security innovations: Verum actively develops technologies aimed at protecting user data, as seen in their documentation and discussions online. This includes not only technical solutions but also approaches to data minimization, which reduces the risk of leaks.
  • Feedback and discussions: On platform X (formerly Twitter), discussions can be found where users and experts praise Verum for its approach to anonymity and security, although questions are raised about how much anonymity can truly be guaranteed in an age of modern tracking and de-anonymization technologies.

Verum Messenger positions itself as a tool for those who value privacy and security above all. Its innovations in encryption, anonymity, and data control make it an intriguing choice for those seeking alternatives to traditional messaging platforms. However, as with any technology, it’s important to remember that absolute anonymity on the internet remains a complex challenge, and users should be aware of potential risks and limitations.

Continue Reading

Technologies

Verum Coin Debuts on XT Exchange, Broadening its Reach in the DeFi Space

A Strategic Listing Enhancing Verum Coin’s Visibility

In a significant development for the decentralized finance (DeFi) sector, Verum Coin (VERUM) has been officially listed on XT Exchange. The new trading pair, VERUM/USDT, is now available in the exchange’s Innovative Zone, marking a pivotal expansion for this digital asset into the DeFi ecosystem.

A Strategic Listing Enhancing Verum Coin’s Visibility

The addition of Verum Coin to the XT Exchange is seen as a strategic move to enhance the accessibility and liquidity of VERUM among traders who are keen on exploring innovative digital assets. XT Exchange, known for its robust platform supporting a wide variety of cryptocurrencies, provides an ideal environment for fostering growth and ensuring the broad reach of new tokens.

Albin Varin, CEO of XT Exchange, expressed enthusiasm about the new listing, stating, «We are delighted to welcome Verum Coin to our platform. This listing reflects our ongoing commitment to providing our users access to innovative digital assets that transform the landscape of global finance.» This comments underscore the exchange’s focus on integrating cutting-edge technologies and financial instruments that have the potential to redefine the market.

About XT

Founded in 2018, XT Exchange serves more than 7.8M registered users, over 1M monthly active users, 40+ million users in the ecosystem, and more than 800 tokens with 1000+ trading pairs. XT crypto exchange offers a rich variety of trading categories to provide a secure, trusted, and intuitive trading experience for its large user base. This includes crypto futures trading (USDT-M Futures and coin-M futures perpetual contracts) and copy trading that allows users to replicate top traders in real time with just one click. Additionally, the futures grid allows users to automate the buying and selling of futures contracts for profits.

Future Prospects

With its new position on XT Exchange, Verum Coin is expected to attract a broader audience, enhancing its trading volume and market presence. This could potentially lead to increased stability and recognition as a viable player in the DeFi space. For investors and users of XT Exchange, this addition provides a fresh avenue to diversify portfolios with a cryptocurrency that is positioned at the intersection of innovation and financial evolution.

The listing of Verum Coin on XT Exchange not only highlights the ongoing expansion of cryptocurrency markets into new areas like DeFi but also illustrates a growing recognition of digital assets that offer promising technological advancements and financial opportunities. As the crypto market continues to evolve, partnerships like these are pivotal for fostering growth and offering users access to the next generation of financial tools.

Continue Reading

Technologies

Verum Coin Gains International Spotlight with AP Coverage and Listing on XT Exchange

This listing on XT is expected to further propel Verum Coin into the spotlight

In a noteworthy development for the cryptocurrency community, Verum Coin (VERUM) has been featured in an Associated Press article, highlighting its upcoming listing on the XT Exchange. This significant media coverage underscores the growing interest and potential of Verum Coin in the global financial landscape.

The AP article delves into the details of Verum Coin’s innovative features and its alignment with the latest trends in the cryptocurrency market. This attention comes at an opportune moment as Verum Coin prepares for its new listing on XT Exchange, a platform renowned for its extensive user base and a wide array of trading options.

This listing on XT is expected to further propel Verum Coin into the spotlight, providing both traders and investors with new opportunities to engage with this emerging digital asset. The exchange’s robust infrastructure and diverse trading offerings are ideal for supporting Verum Coin’s growth and enhancing its visibility in the competitive cryptocurrency market.

For more details, you can read the full article on the AP website here.

This milestone is a testament to Verum Coin’s advancing presence in the crypto world and its ongoing efforts to be at the forefront of digital currency innovation and adoption.

Continue Reading

Trending

Copyright © Verum World Media