Forum Discussion

1492's avatar
1492
Moderator
Jun 17, 2015

LastPass Hacked! Change Master Password Now!

And enable the recommended two-factor authentication immediately. See article Hack of cloud-based LastPass exposes hashed master passwords.

I received the notification email this evening, though only have a test account with LastPass, and do not use it to store any of my personal passwords. In fact, I will not store passwords on any online service, as it potentially gives hackers that much more direct access to all your personal data/passwords in the event your master password is breached. Which should not be used without two-factor authentication.

Personally, I prefer a password management app such as KeePass, storing the encrypted database locally. Though passwords stored on virtually any app, even KeePass, can potentially be captured from malware such as a keylogger. Yet you have more options to protect the master password and password database locally. For instance, KeePass has the ability to input master password through Windows secured desktop.

Doing so, I was not able to breach the master password using a couple of popular keyloggers as a security test I ran some time ago. However, I was able to capture individual passwords from KeePass, when transferring them using Windows clipboard(copy and paste), or manually inputting them from a hard or soft keyboard.

Furthermore, I was also able to capture the critical credentials when logging in to LastPass from a browser, which allowed access to my test passwords stored online using a popular keylogger. Highlighting the importance of two-factor authentication. Yet can be of limited effectiveness in the event of a malware breach on the local system.

Surprisingly, I was not able to capture any passwords from keyloggers using Firefox's built in password database, which is what I'm using for online account access, except for banking/financial accounts. But does not mean its necessarily the most secured solution, as an undiscovered browser vulnerability could breach its password security. Which is why I keep Firefox password database and profile hardened using a separate strong 256 bit AES encryption.

Further highlighting the dangers of keylogger rootkit malware, which can be notoriously difficult to detect. None of my top rated AV software could identify or flag their activity. Only Malwarebytes Free was successful in doing so.

Keyboard encryption apps were also able to block password capture from the keyloggers I tested. However, they were only effective if the app loaded ahead of the keylogger. Otherwise, malware was able to capture the clipboard which rendered the apps useless. Which just emphasizes the importance of having a layered security approach to lock down your system, as there are no perfect solutions to guard against hackers.
  • An excellent example of why storing sensitive data "in the cloud" is not necessarily the best idea.

    All my passwords, over 300 so memorizing is out of the question, are stored locally with Roboform. Also Roboform enters the passwords so the clipboard doesn't get used, and no typing the passwords so safe from keyloggers. The master password could be gotten but not any of the others. Screen capture software would work, but really that is a bit of a stretch.

    1492, have you worked with Roboform any and tested its capabilities? I'd be curious to know how it fared.

    Nothing is perfect, but sometimes you just have to do the best you can.
  • sch911 wrote:
    Always thought passwords should be stored in one's brain, which short of torture or waterboarding is pretty secure. Why do people use these things? Laziness?


    When I worked in Defense the rules were every account one had on classified computers had to have a different password which needed to be changed every 90 days and couldn't be reused. The company extended this rule to all computers, even the unclassified ones. It's virtually impossible to keep up with all the passwords especially when one has accounts on a dozen or more systems. And to make matters even worse, if you wrote the password down or stored it in a file or password keeper app and that password was for a classified account, the record of the password was itself classified and had to be treated as such.

    The hilarious part of this was the Corporate Security Officer had to have access to every classified computer's BIOS and Administrator accounts. Realizing she couldn't remember the thousands of passwords required and couldn't meet the requirement of changing them every 90 days she created an except to the rule for herself. All her passwords on all computers were set the same and never changed!
  • I too have many passwords to remember and have to write them down, but I write down clues instead of passwords to remind me. No matter where or how I store them I get that extra layer of protection.
  • sch911 wrote:
    Always thought passwords should be stored in one's brain, which short of torture or waterboarding is pretty secure. Why do people use these things? Laziness?



    Good operational security dictates not reusing passwords for more than one account. It also says one should use a complex password.

    I have upwards of 400 logins at various places. My memory is not what it used to be so remembering 400 complex passwords is impossible.
  • Always thought passwords should be stored in one's brain, which short of torture or waterboarding is pretty secure. Why do people use these things? Laziness?
  • Is anyone shocked or surprised ??

    The notebook where I keep all my logon IDs and passwords cannot be hacked.

About RV Must Haves

Have a product you cannot live without? Share it with the community!8,793 PostsLatest Activity: Feb 08, 2025