{"id":39047,"date":"2022-12-23T21:51:39","date_gmt":"2022-12-23T21:51:39","guid":{"rendered":"http:\/\/egrowonline.com\/?p=39047"},"modified":"2022-12-23T21:51:39","modified_gmt":"2022-12-23T21:51:39","slug":"lastpass-attacker-stole-password-vault-data-showing-web2s-limitations","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=39047","title":{"rendered":"LastPass attacker stole password vault data, showing Web2&#8217;s limitations"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div data-v-71d2d00b=\"\">\n<p>Password management service LastPass was hacked in August 2022, and the attacker stole users\u2019 encrypted passwords, according to a Dec. 23 statement from the company. This means that the attacker may be able to crack some website passwords of LastPass users through brute force guessing.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Notice of Recent Security Incident &#8211; The LastPass Blog<a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/lastpasshack?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#lastpasshack<\/a> <a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/hack?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#hack<\/a> <a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/lastpass?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#lastpass<\/a> <a target=\"_blank\" href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" rel=\"noopener\">#infosec<\/a> <a target=\"_blank\" href=\"https:\/\/t.co\/sQALfnpOTy\" data-amp=\"https:\/\/blog-lastpass-com.cdn.ampproject.org\/c\/s\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/amp\/\" rel=\"noopener\">https:\/\/t.co\/sQALfnpOTy<\/a><\/p>\n<p>\u2014 Thomas Zickell   (@thomaszickell) <a target=\"_blank\" href=\"https:\/\/twitter.com\/thomaszickell\/status\/1606099838885658625?ref_src=twsrc%5Etfw\" rel=\"noopener\">December 23, 2022<\/a><\/p><\/blockquote>\n<p>LastPass first disclosed the breach in August 2022 but at that time, it appeared that the attacker had only obtained source code and technical information, not any customer data. However, the company has investigated and discovered that the attacker used this technical information to attack another employee\u2019s device, which was then used to obtain keys to customer data stored in a cloud storage system. <\/p>\n<p>As a result, unencrypted customer metadata has been <a target=\"_blank\" href=\"https:\/\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/\" rel=\"noopener nofollow\" data-amp=\"https:\/\/blog-lastpass-com.cdn.ampproject.org\/c\/s\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/amp\/\">revealed<\/a> to the attacker, including \u201ccompany names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.\u201d<\/p>\n<p>In addition, some customers\u2019 encrypted vaults were stolen. These vaults contain the website passwords that each user stores with the LastPass service. Luckily, the vaults are encrypted with a Master Password, which should prevent the attacker from being able to read them.<\/p>\n<p>The statement from LastPass emphasizes that the service uses state-of-the-art encryption to make it very difficult for an attacker to read vault files without knowing the Master Password, stating:<\/p>\n<blockquote><p>\u201cThese encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user\u2019s master password using our Zero Knowledge architecture. As a reminder, the master password is never known to LastPass and is not stored or maintained by LastPass.\u201d<\/p><\/blockquote>\n<p>Even so, LastPass admits that if a customer has used a weak Master Password, the attacker may be able to use brute force to guess this password, allowing them to decrypt the vault and gain all of the customers\u2019 website passwords, as LastPass explains:<\/p>\n<blockquote><p>\u201cit is important to note that if your master password does not make use of the [best practices the company recommends], then it would significantly reduce the number of attempts needed to guess it correctly. In this case, as an extra security measure, you should consider minimizing risk by changing passwords of websites you have stored.\u201d<\/p><\/blockquote>\n<h2>Can password manager hacks be eliminated with Web3?<\/h2>\n<p>The LastPass exploit illustrates a claim that Web3 developers have been making for years: that the traditional username and password login system needs to be scrapped in favor of blockchain wallet logins.<\/p>\n<p>According to advocates for <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/your-crypto-wallet-is-the-key-to-your-web3-identity\" data-amp=\"https:\/\/cointelegraph-com.cdn.ampproject.org\/c\/s\/cointelegraph.com\/news\/your-crypto-wallet-is-the-key-to-your-web3-identity\/amp\" rel=\"noopener\">crypto wallet login<\/a>, traditional password logins are fundamentally insecure because they require hashes of passwords to be kept on cloud servers. If these hashes are stolen, they can be cracked. In addition, if a user relies on the same password for multiple websites, one stolen password can lead to a breach of all others. On the other hand, most users can\u2019t remember multiple passwords for different websites.<\/p>\n<p>To solve this problem, password management services like LastPass have been invented. But these also rely on cloud services to store encrypted password vaults. If an attacker manages to obtain the password vault from the password manager service, they may be able to crack the vault and obtain all of the user\u2019s passwords.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/explained\/how-web3-resolves-fundamental-problems-in-web2\" data-amp=\"https:\/\/cointelegraph-com.cdn.ampproject.org\/c\/s\/cointelegraph.com\/explained\/how-web3-resolves-fundamental-problems-in-web2\/amp\" rel=\"noopener\">Web3 applications solve the problem<\/a> in a different way. They use browser extension wallets like Metamask or Trustwallet to sign in using a cryptographic signature, eliminating the need for a password to be stored in the cloud.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2022-12\/7f19b789-3c58-4585-a981-a0a29e38d260.png\" alt=\"\" title=\"\" \/><figcaption style=\"text-align: center\"><em>An example of a crypto wallet login page. Source: Blockscan Chat<\/em><\/figcaption><\/figure>\n<p>But so far, this method has only been standardized for decentralized applications. Traditional apps that require a central server don\u2019t currently have an agreed-upon standard for how to use crypto wallets for logins.<\/p>\n<p><em><strong>Related: <\/strong><a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/meta-fined-265m-for-allowing-scrapers-to-steal-facebook-s-centralized-user-data\" data-amp=\"https:\/\/cointelegraph-com.cdn.ampproject.org\/c\/s\/cointelegraph.com\/news\/meta-fined-265m-for-allowing-scrapers-to-steal-facebook-s-centralized-user-data\/amp\" rel=\"noopener\"><strong>Facebook is fined 265M euros for leaking customer data<\/strong><\/a><\/em><\/p>\n<p>However, a recent Ethereum Improvement Proposal (EIP) aims to remedy this situation. Called \u201cEIP-4361,\u201d the proposal attempts to <a target=\"_blank\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-4361\" rel=\"noopener nofollow\">provide<\/a> a universal standard for web logins that works for both centralized and decentralized applications.<\/p>\n<p>If this standard is agreed upon and implemented by the Web3 industry, its proponents hope that the entire world wide web will eventually get rid of password logins altogether, eliminating the risk of password manager breaches like the one that has happened at LastPass.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/cointelegraph.com\/news\/lastpass-attacker-stole-password-vault-data-showing-web2-s-limitations\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Password management service LastPass was hacked in August 2022, and the attacker stole users\u2019 encrypted passwords, according to a Dec. 23 statement from the company. This means that the attacker may be able to crack some website passwords of LastPass users through brute force guessing. Notice of Recent Security Incident &#8211; The LastPass Blog#lastpasshack #hack [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":39048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[41],"tags":[10936,21,13008,2451,3925,2033,3563,13009,10392],"class_list":["post-39047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethereum","tag-attacker","tag-data","tag-lastpass","tag-limitations","tag-password","tag-showing","tag-stole","tag-vault","tag-web2s"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/12\/585715b7-32b9-4fe2-b5b8-e00ef86f5eff.jpg","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/39047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=39047"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/39047\/revisions"}],"predecessor-version":[{"id":39049,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/39047\/revisions\/39049"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/39048"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=39047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=39047"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=39047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}