We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!

LastPass Password Manager - Time to move on?

Options
124

Comments

  • womble12345
    womble12345 Posts: 591 Forumite
    Part of the Furniture 500 Posts
    edited 28 December 2022 at 12:11PM
    k_man said:

    It could be done against any system, once an offline copy of the data has been obtained.
    This bypasses any 2FA, auto lockout protection etc.

    Are you saying that even if I have had LastPass 2FA turned on for years that now these files are available for all on the dark web that the hackers just need to guess the passphrase to get access to all my passwords?
  • k_man said:

    It could be done against any system, once an offline copy of the data has been obtained.
    This bypasses any 2FA, auto lockout protection etc.

    Are you saying that even if I have had LastPass 2FA turned on for years that now these files are available for all on the dark web that the hackers just need to guess the passphrase to get access to all my passwords?
    I'm not saying, but yes. 2FA etc only protects access to your account on LastPass's servers. Once that data is copied elsewhere then these protections don't apply. It should be said, however, that as long as your master password is decently complicated then gaining access to your data is a bit harder than "just need to guess the passphrase".

    This is why this breach is so serious. There is little point in changing your master password at LastPass (though I would and have done), what needs to be changed are the passwords contained therein. 
  • Miser1964
    Miser1964 Posts: 283 Forumite
    100 Posts First Anniversary Photogenic Name Dropper
    edited 28 December 2022 at 2:13PM
    IMHO as well as renewing passwords on critical accounts, enable MFA/2FA on all accounts that offer this.
  • 400ixl
    400ixl Posts: 4,482 Forumite
    1,000 Posts Third Anniversary Name Dropper
    edited 28 December 2022 at 2:24PM
    k_man said:

    It could be done against any system, once an offline copy of the data has been obtained.
    This bypasses any 2FA, auto lockout protection etc.

    Are you saying that even if I have had LastPass 2FA turned on for years that now these files are available for all on the dark web that the hackers just need to guess the passphrase to get access to all my passwords?
    "Just" makes it sound simple. Provided your master password was complex and followed good practice that "just" should be measured in years of focussed attempts to crack with todays compute power.

    If the master password is simple to dictionary attack, then you should be concerned and be starting to change the passwords on accounts, prioritising those which could have a financial consequence. After setting a new secure master password of course.
  • k_man
    k_man Posts: 1,636 Forumite
    1,000 Posts Second Anniversary Name Dropper
    k_man said:

    It could be done against any system, once an offline copy of the data has been obtained.
    This bypasses any 2FA, auto lockout protection etc.

    Are you saying that even if I have had LastPass 2FA turned on for years that now these files are available for all on the dark web that the hackers just need to guess the passphrase to get access to all my passwords?
    I'm not saying, but yes. 2FA etc only protects access to your account on LastPass's servers. Once that data is copied elsewhere then these protections don't apply. It should be said, however, that as long as your master password is decently complicated then gaining access to your data is a bit harder than "just need to guess the passphrase".

    This is why this breach is so serious. There is little point in changing your master password at LastPass (though I would and have done), what needs to be changed are the passwords contained therein. 
     While this breach is a serious one, the risk of offline attack to a password vault already existed, and is not specific to LastPass or another other cloud based password manager.

     Any vault or encrypted file is already vulnerable from:

    A compromised PC
    A compromised mobile device
    A compromise of the cloud storage provider
    A compromise of the transit network
    Other compromises I haven't listed

    IMO this breach doesn't really identify LastPass (or other cloud providers of Password managers) as bad/not-to-be-used, but just highlights, that while Password Managers are the best option for most users, they need to be used correctly, and aren't a security magic bullet.
    But the general model is not broken, just Lastpass' implementing wasn't as good as it could have been

    It is a good reminder to get used to the process of mass password (and other saved information) changes*
     Fortunately, this can be done semi automatically for many passwords, via some password managers.

    *Note password change not rotation, as the latter implies cycling/reuse.




  • The LastPass security problem mentioned means that a user is not directly in control of their own security.
    Would it not be better to have your own Notepad file, with a strong password for each of your online accounts?

  • 400ixl
    400ixl Posts: 4,482 Forumite
    1,000 Posts Third Anniversary Name Dropper
    goodValue said:
    The LastPass security problem mentioned means that a user is not directly in control of their own security.
    Would it not be better to have your own Notepad file, with a strong password for each of your online accounts?

    No. Are you going to carry that notebook around with you everywhere? The risk of losing that is far far higher than anyone cracking a good master password on a password vault.
  • victor2
    victor2 Posts: 8,103 Ambassador
    Part of the Furniture 1,000 Posts Name Dropper
    goodValue said:
    The LastPass security problem mentioned means that a user is not directly in control of their own security.
    Would it not be better to have your own Notepad file, with a strong password for each of your online accounts?

    Where do you keep that notepad file? On multiple devices in multiple locations and/or in the cloud for extra security?? How do you keep them up to date?
    Also, are the various passwords in it ones you can easily retype when needed, so not as secure as they could be?

    I’m a Forum Ambassador and I support the Forum Team on the In My Home MoneySaving, Energy and Techie Stuff boards. If you need any help on these boards, do let me know. Please note that Ambassadors are not moderators. Any posts you spot in breach of the Forum Rules should be reported via the report button, or by emailing forumteam@moneysavingexpert.com. 

    All views are my own and not the official line of MoneySavingExpert.

  • Miser1964
    Miser1964 Posts: 283 Forumite
    100 Posts First Anniversary Photogenic Name Dropper
    edited 28 December 2022 at 3:45PM
    Anything that reduces the risk from using the same password over and over is worth considering.

    If you only use one PC at home, then having a password notebook is an option as it can't be hacked.

    Another option to create reasonable passwords is to generate from a process such as combining -

    Non dictionary root, i.e. "99FG*haA" which you can write down and keep in wallet as it's hard to remember. 

    Memorable, hard to find online addition, i.e. favourite colour "Green"

    Unique element - 1st, 3rd and 4th letter of website name, i.e. "aaz" for Amazon 

    giving "99FG*haAGreenaaz" as strong, unique password you can regenerate using the process.

    Clever Fox Password Book Spiral – Mini Internet Address & Password Organizer with Laminated Alphabetical Tabs – Small Password Keeper Journal – Hardcover, Pocket Size, 12x14.5cm (Mystic Blue) : Amazon.co.uk: Stationery & Office Supplies
  • As regards using your own file for storing passwords, I know my own situation will be different to the majority of users.
    It would be one file, on one device (laptop).
    Each password would be copied/pasted when needed.
    Does this still fall foul of issues of keeping up to date/security/losing file that were mentioned?

Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 350.8K Banking & Borrowing
  • 253K Reduce Debt & Boost Income
  • 453.5K Spending & Discounts
  • 243.8K Work, Benefits & Business
  • 598.6K Mortgages, Homes & Bills
  • 176.8K Life & Family
  • 257.1K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16.1K Discuss & Feedback
  • 37.6K Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.