I have found the first of will likely be many non-expiring password reset URLs that you may have had stored in #LastPass
If you had a maxmind.com
URL in LastPass that included set-password?token=
in the parameters, I just tested and those do not expire... Possession of the URL is all you need in order to change the password.
Shame shame, Maxmind.
Want to hunt for your own possibly sensitive URLs? Start with this against your vault export.
cat lastpass_export.csv | cut -d',' -f 1 | grep -a -i -e '^http' | grep -v 'http://sn' | egrep -i '(api|password|reset|secret|token)'
Sam Bankman-Fried's old friends and former execs at FTX / Alameda Research, Caroline Ellison and Gary Wang, have pleaded guilty to fraud charges and are cooperating with the feds. #FTX #crypto #SBF .
According to the Washington Post they're facing 110 years and 50 years, respectively... So yeah I see why they started snitching real fast.
Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.
Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!
Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.
Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.
Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:
1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celbs, .gov, .mil, fortune 100)
If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.
I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?
A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.
For more password insights like this, give me a follow!
@doodlyroses I wish there would have been more music scenes after the first act.
Adult Swim Yule Long, AKA The Fireplace is a 90 minutes to remember. Out now for the holiday spirit!
@jfslowik beyond the valley of the dolls - the valley of the dolls
@taylorlorenz It'd be cool if WaPo could set up a server for writers with all the features they need.
@hasmis it was wild. The voice literally said "turn left at Liberty Avenue after the Rite Aid." Every other turn passing a retail business did not mention the business name.
@garykrysztopik The Sakura is so cute!
I see a bunch of Rivian trucks parked on the street in SF. They look very cool to me.
We need more small #EV’s and fewer trucks. https://global.nissannews.com/en/releases/221208-01-e
@smirk @garykrysztopik @michaelbmitchell The 0-to-60 in ~ 1 second performance of a Model 3 is fantastically thrilling. That should appeal to everyone.
@garykrysztopik Tesla has nothing to do with global warming and everything to do with an evil billionaire stashing money in an overvalued battery company. They threw all their chips into the "driverless" basket then the Autopilot feature mowed down humans and other drivers with impunity.
There's no way Tesla can compete with Big Auto now that EVs are socially acceptable.
@vitriolix It's okay to admit you did a ride in a Zoox prototype
Flyin' stuff in space with @momentusspace@twitter.com. Playin' classical piano for fun. Making music as Griftmarket.