978
submitted 2 years ago by L4s@lemmy.world to c/technology@lemmy.world

More than $35 million has been stolen from over 150 victims since December — ‘nearly every victim’ was a LastPass user::Security experts believe some of the LastPass password vaults stolen during a security breach last year have now been cracked open following a string of cryptocurrency heists

top 50 comments
sorted by: hot top controversial new old
[-] Ado@lemmy.world 162 points 2 years ago
[-] CMGX78@lemmy.world 70 points 2 years ago

I dumped LastPass for Bitwarden a few years ago. So glad I did.

load more comments (1 replies)
[-] iHUNTcriminals@lemm.ee 51 points 2 years ago

Selfhosted for extra win!?

[-] OberonSwanson@sh.itjust.works 18 points 2 years ago

Any recommendations on how-to?

[-] treadful@lemmy.zip 34 points 2 years ago

KeepassXC (desktop)/KeePassDX(mobile) on top of something like Syncthing or Nextcloud.

load more comments (2 replies)
[-] hobbit@lemm.ee 27 points 2 years ago* (last edited 2 years ago)

Vaultwarden is what I use: https://github.com/dani-garcia/vaultwarden/

Their wiki is pretty good assuming you're comfortable with Docker.

Back before I self-hosted, KeePassXC for desktop and Keepass2Android for mobile (along with Synching to sync the database) got the job done.

load more comments (2 replies)
load more comments (6 replies)
load more comments (4 replies)
load more comments (13 replies)
[-] merc@sh.itjust.works 158 points 2 years ago

Nearly every victim was a LastPass user.

But every victim was a cryptocurrency user.

[-] sturmblast@lemmy.world 20 points 2 years ago

I'd be willing to bet that people store their key phrases in the notes section in LastPass which was not encrypted at rest

load more comments (4 replies)
[-] hansl@lemmy.ml 14 points 2 years ago

I also heard every victim were addicted to water…

load more comments (1 replies)
[-] SeducingCamel@lemm.ee 94 points 2 years ago

Switched to bitwarden as soon as they tried to charge a sub for multiple devices, I see that was the right choice

[-] ultratiem@lemmy.ca 28 points 2 years ago* (last edited 2 years ago)

Are you not worried your vault is still on their servers? I feel most companies don’t delete shit. Most have ways to get around it saying they keep some info for taxes, accounting, etc.

I wouldn’t sleep well knowing my passwords were on there at any given time.

[-] learningduck@programming.dev 27 points 2 years ago

You can host a bitwarden vault yourself. They open sourced and audited. So, trustworthy that there's no back door somewhere to some degree.

[-] PixxlMan@lemmy.world 21 points 2 years ago

I suspect they're referring to LastPass?

load more comments (1 replies)
load more comments (5 replies)
load more comments (3 replies)
[-] LemmyFeed@lemmy.world 81 points 2 years ago

These guys saved their seed phrases to LastPass, not just account passwords. You can't just change your seeds without moving funds to a new wallet.

The main lesson here is never store your seeds in digital form, ever. Write it down by hand on paper at creation and then take additional efforts to safeguard it.

load more comments (12 replies)
[-] saltynuts420@lemm.ee 59 points 2 years ago

instead of using a password manager managed by a PRIVATE ENTITY people should start using bitwarden ... its opensource, free and much more secure and reliable

[-] yetAnotherUser@lemmy.ca 19 points 2 years ago

I personally use KeepassXD on my phone, although it hasn't had a security audit. There is also KeepassXC for desktop, which has had an audit

[-] forbiddenlake@lemmy.world 19 points 2 years ago

But who is running the bitwarden server? Bitwarden the private company.

I self host vault warden, but it's really not something everyone can do.

load more comments (2 replies)
[-] RaivoKulli@sopuli.xyz 14 points 2 years ago

Bitwarden, the host, is a private entity

[-] PlexSheep@feddit.de 13 points 2 years ago

I prefer local password managers. Synchronisation is achieved with a syncing service of our choice.

load more comments (1 replies)
load more comments (7 replies)
[-] dangblingus@lemmy.world 51 points 2 years ago

Pro Tip: You don't need to give a private company all of your passwords. That literally defeats the purpose of having passwords.

[-] Asafum@feddit.nl 18 points 2 years ago

A-fucking-men... but I was always given shit for saying this.

Anything can be hacked or stolen, I don't trust any company to secure my information. :/

load more comments (5 replies)
load more comments (2 replies)
[-] sonnenzeit@feddit.de 46 points 2 years ago* (last edited 2 years ago)

Man am I glad that I picked KeypassXC as my password manager some years ago. Super safe, easy to use, costs nothing, not dependant on internet/cloud, can export data to another app at any time, transparent because open source.

I'm using Syncthing to synchronize across devices which arguably took some fiddling to set up but I only had to fiddle once and haven't touched the configuration since; it just works automagically in the background.

[-] Kabutor@lemmy.dbzer0.com 14 points 2 years ago

Keepassxc and syncthing? Are you a clone of myself? :D

Same setup, working as a charm

load more comments (1 replies)
load more comments (5 replies)
[-] RBWells@lemmy.world 30 points 2 years ago

That's an average of over 200k each. I'm wondering how they managed to target people with so much money.

[-] A2PKXG@feddit.de 15 points 2 years ago

People with less might just not complain loudly

[-] Professor_Piddles@sh.itjust.works 29 points 2 years ago

Any obvious holes in keeping a text file on my laptop that I encrypt when not using it? Using ccrypt on linux.

I do not want my passwords - even encrypted - on the cloud or at the mercy of a 3rd party in any fashion.

[-] Rootiest@lemm.ee 29 points 2 years ago* (last edited 2 years ago)

Use KeePass.

My concern with using a text file is you have to defrost it to use it and whenever it's not encrypted it's potentially exposed. You are also vulnerable to keyloggers or clipboard captures

KeePass works entirely locally, no cloud. And it's far more secure/functional than a text file.

I personally use KeePass, secured with a master password + YubiKey.

Then I sync the database between devices using SyncThing over a Tailscale network.

KeePass keeps the data secure at rest and transferring is always done P2P over SSL and always inside a WireGuard network so even on public networks it's protected.

You could just as easily leave out the Tailscale/SyncThing and just manually transfer your database using hardware air-gapped solutions instead but I am confident in the security of this solution for myself. Even if the database was intercepted during transit it's useless without the combined password/hardware key.

load more comments (8 replies)
[-] ThetaDev@lemm.ee 13 points 2 years ago* (last edited 2 years ago)

Yes, if you write the decrypted file to disk, it could be recovered. Deleting files only removes the file system entries - it does not wipe the content.

Use a local password manager. KeePass (use the KeePassXC variant on Linux) is the most popular choice. If you prefer a command line tool, pass (passwordstore.org) is an option.

load more comments (2 replies)
load more comments (6 replies)
[-] autotldr@lemmings.world 17 points 2 years ago

This is the best summary I could come up with:


Cybersecurity blogger Brian Krebs reports that several researchers have identified a “highly reliable set of clues” that seemingly connect over 150 victims of crypto theft with the LastPass service.

Taylor Monahan, lead product manager at crypto wallet company MetaMask and one of the key researchers investigating the attacks, concluded that the common thread connecting the victims was that they’d previously used LastPass to store their “seed phrase” — a private digital key that’s required to access cryptocurrency investments.

These keys are often stored on encrypted services like password managers to prevent bad actors from gaining access to crypto wallets.

We have reached out to LastPass to confirm if any of the stolen password vaults have been cracked and will update this story if we hear back.

Researcher Nick Bax, director of analytics at crypto wallet recovery company Unciphered, also reviewed the theft data and agreed with Monahan’s conclusions in an interview with KrebsOnSecurity:

“I’m confident enough that this is a real problem that I’ve been urging my friends and family who use LastPass to change all of their passwords and migrate any crypto that may have been exposed, despite knowing full well how tedious that is.”


The original article contains 363 words, the summary contains 196 words. Saved 46%. I'm a bot and I'm open source!

load more comments (1 replies)
[-] Honytawk@lemmy.zip 15 points 2 years ago

I don't understand saving your passwords to the cloud in the first place

It is like storing all the passwords in one convenient place that can be accessed from any location on the planet, making it the most convenient and juicy target for hackers.

Even encrypted, it just doesn't make sense.

[-] thbb@lemmy.world 17 points 2 years ago

At one of my clients, a large institution, they go further: you're not allowed to use the local browser's password manager. And still have to abide by the usual password rules: rotate every 3 months, complex passwords, etc.

As a result,, users store a plain text file on their desktop (some go as far as printing it), that conveniently allows them to retrieve their passwords.

Too much security kills security.

[-] Karyoplasma@discuss.tchncs.de 16 points 2 years ago

Forcing a password change after a period of time has shown to make people gravitate towards the simplest passwords that are still within the policy or other, even less secure, solutions. That's why security standards nowadays advise to not implement forced password changes.

load more comments (2 replies)
[-] z00s@lemmy.world 15 points 2 years ago

I mean, they've had more than long enough to change passwords.

Nobody is after your password for the Moravian rug weaving forum but in this day and age it's on you, if you know there's a breach and you don't change your banking / crypto passwords.

load more comments (2 replies)
load more comments
view more: next ›
this post was submitted on 07 Sep 2023
978 points (100.0% liked)

Technology

72729 readers
1641 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS