More than $35 million has been stolen from over 150 victims since December — ‘nearly every victim’ was a LastPass user::Security experts believe some of the LastPass password vaults stolen during a security breach last year have now been cracked open following a string of cryptocurrency heists
Nearly every victim was a LastPass user.
But every victim was a cryptocurrency user.
Ado@lemmy.world 1 year ago
Bitwarden or keepass ftw
CMGX78@lemmy.world 1 year ago
I dumped LastPass for Bitwarden a few years ago. So glad I did.
PhatInferno@midwest.social 1 year ago
Same! Thinking i coulda been a victim in this attack is scary!
iHUNTcriminals@lemm.ee 1 year ago
Selfhosted for extra win!?
OberonSwanson@sh.itjust.works 1 year ago
Any recommendations on how-to?
Ado@lemmy.world 1 year ago
Self-hosted with yubikey 2fa. Even Santa Claus can’t see my info 😎
ramble81@lemm.ee 1 year ago
So what makes Bitwarden better than LastPass if you’re using Bitwarden’s hosted option (I know you can keep it locally).
PM_Your_Nudes_Please@lemmy.world 1 year ago
From what I remember (take this with a grain of salt since it’s all from when the big LastPass breach happened,) LastPass didn’t actually encrypt your entire vault. They only encrypted the passwords. The rest of the vault, (which would be comprised of usernames and the sites that are associated with them, notes, images, etc) were unencrypted. So even without cracking any vaults, hackers got access to gigantic lists of usernames and their associated email addresses. That’s valuable in and of itself, because it allows them to spear-phish those users.
For example, you may not fall for a regular phishing scam. But you may fall for it if the email has your username and recovery info in it. Because they know every email you’ve used to sign up for something and all of your different usernames that you used on that site, so they can craft convincing phishing emails that are specifically tailored to you.
It also allows them to search for specific users. Maybe there is a user on a crypto forum who is particularly noteworthy. Their username is already known on the site, and hackers are able to cross-reference that with the list of known usernames/emails and see if that user’s vault was part of the breach. If it was, they can focus on breaching that one user’s vault, instead of aimlessly trying random vaults.
DrCake@lemmy.world 1 year ago
I’m not 100% but I think Bitwarden actual encrypt the entire ‘password object’. So the url, username, password, and any notes. Lastpass didn’t/doesn’t encrypt the url so if anyone gets access to the vault, they have a list of websites where the person will have an account and can more accurately send phishing emails.
Lucidlethargy@sh.itjust.works 1 year ago
There’s no such thing as an impenetrable password manager. I keep my most secure passwords in my head, and so should everyone.
Even if the software were perfect, people aren’t. Anyone can be fooled under the right circumstances. It’s better to expose one service than all of them at once.
PlexSheep@feddit.de 1 year ago
Your head cannot be securely backed up, and you are not resistant to major thread actors (torture, and so on)
Ozymati@lemmy.nz 1 year ago
2fA is an important element too.
Ado@lemmy.world 1 year ago
How would someone steal my password and my physical yubikey for 2fa?