I've just had a bizarre thing happen and wanted to see if the HN community could come up with some theories as to what happened.
LastPass blocked a login attempt from Brazil (it wasn't me). According to an email I received from LastPass, this login was using the LastPass account's master password. The email doesn't look like it's a phishing attempt.
What troubles me is that the master password was stored in a local encrypted KeePassX file.
I can imagine that someone has my KeePassX file and the (completely different) password to this file. If that's the case, I'm in a world of hurt.
But are there any other possibilities? Is the email from LastPass accurate i.e. was the login attempt actually using my master password? Is there some LastPass extension installed on some computer still having a valid auth token allowing them to login as me to LastPass..?
I'm really confused, and scared.
Thanks for your help.
P.S. The LastPass account had 2FA set up, but I was able to simply remove it (since I didn't have access to the token anymore). That's scary too -- what's the point of a 2FA you can remove...??
---
Update:
- the email was truly not phishing -- the same information regarding the login attempt appears in my LastPass dashboard. I also talked to LastPass support over the phone, and they confirmed seeing the same information.
- There are 2 separate users in the thread below confirming that the same exact same thing happened to them, from the exact same IP range as me.
Either the 3 of us had the same malware/Chrome extension or somehow had our master passwords compromised...? Or...? Is this a LastPass issue?
That’s what got me to write and publish this: https://neosmart.net/blog/2017/a-free-lastpass-to-1password-...
EDIT: "or whatever" means I couldn't remember the name of the php forum notorious for its insecurity, I thought it was something like 'bbulletin'. It was phpBB.
-- Login attempt blocked Hello,
Someone just used your master password to try to log in to your account from a device or location we didn't recognize. LastPass blocked this attempt, but you should take a closer look. ---
Like you, it told me that the attempt came from Brazil, using an IP address starting with 160. I have no idea how they would've gotten that password. Made me wonder if LastPass had some issue, but nothing was in haveibeenpwned
Time Monday, December 27, 2021 at 3:50 PM EST
Location UNITED STATES
IP address 107.173.195.83
Actions taken, in this order: - Head to *Advanced Options* -> *View account history* to see if anything suspicious is going on (nothing so far)
- Disable Lastpass MFA and use Google Authenticator (Authy)
- *Account Settings* -> click on *Show Advanced Settings* -> *Destroy Sessions* (to see if anyone is actively logged in)
- *Account Settings* -> click on *Show Advanced Settings* -> *Country Restriction* to my country only (luckily not in the US as the bot was)
- Change Master Password
Also moments earlier: - Investigating all Mac processes
- Disabled all Chrome extensions and deleted most (should have made a list)
Let's hope it's not as bad as it seems.Edit#1 | Following IP addresses are reported in the thread so far:
160.116.88.235
160.116.231.145
160.116.88.235
107.173.195.83
107.173.195.213
154.202.117.78
196.19.204.79
Just deleted my last pass account!
here's the info that came with the email
Time Monday, December 27, 2021 at 1:41 PM EST Location São Paulo, SP 01323, BRAZIL IP address 160.116.88.235
When I moved to Bitwarden, I have deleted my account on LastPass. I have received a confirmation email regarding my account which states [0]:
> Your LastPass account has been permanently deleted and all of your data has been purged from our systems.
A few months later I receive a email stating that my premium subscription is expiring [1]. Clearely my account was not actually permanently deleted from their systems. Considering LastPass is a service used for storing passwords, I think this is unacceptable. How am I sure that they also still don't have my passwords that I had saved in their account?
I reached out to them via Twitter when this happened (because that is apparently how you get support in this day of age) and only then I was told that my account was actually deleted. I still have no way of verifying if this is in fact true or not.
[0]: https://i.imgur.com/P5yEqEl.png [1]: https://i.imgur.com/WyEueF6.png
"LastPass investigated recent reports of blocked login attempts and determined the activity is related to fairly common bot-related activity, in which a malicious or bad actor attempts to access user accounts (in this case, LastPass) using email addresses and passwords obtained from third-party breaches related to other unaffiliated services. It’s important to note that we do not have any indication that accounts were successfully accessed or that the LastPass service was otherwise compromised by an unauthorized party. We regularly monitor for this type of activity and will continue to take steps designed to ensure that LastPass, its users, and their data remain protected and secure."
This of course assumes that it wasn’t really you from an IP that was just misidentified as being from Brazil.
For what it’s worth, I stopped using LastPass after they sold out to LogMeIn and would recommend others stop using it as well.
Deleted my account.
Email Text:
Someone just used your master password to try to log in to your account from a device or location we didn't recognize. LastPass blocked this attempt, but you should take a closer look.
Was this you?
Account ...@gmail.com Time Monday, December 27, 2021 at 11:53 AM EST Location São Paulo, SP 01323, BRAZIL IP address 160.116.95.249
``` Someone just used your master password to try to log in to your account from a device or location we didn't recognize. LastPass blocked this attempt, but you should take a closer look.
Was this you?
Account xxx@xxx.com Time Monday, December 27, 2021 at 12:06 PM EST Location Berlin, BE 12529, GERMANY IP address 196.19.169.161 ```
Of course if Lastpass is sending ambiguous or mistaken communication about whether someone else has your master password, that's a really bad sign for them as a company too.
On the "bright" side, if somebody had your KeePassX file and master password to that, I would think they'd be doing things a lot worse than trying to log into your LastPass account from Brazil. If they had that data and were serious about LastPass for some reason, they'd probably at least break into your email too and try and intercept those warning emails. Keep an eye on email, banking, credit card, hosting systems, any other higher-value accounts that might have credentials in that file for any signs of suspicious activity. If there's none, then a successful exfiltration of that data seems unlikely.
I don’t use LastPass often and wasn’t 100% on my master so I tried logging in and also received the block login alter from my attempt. I verified the new location/device and then tried again and it told me the password was invalid. Tried again and got in fine.
Could it be that master passwords are not actually compromised but they are sending the unrecognized device/location on any login attempt regardless of correct master?
Can someone else verify blocked login from unknown device/location using a wrong master password?
0. Consider using a new device for the following or wipe and reinstall an old device in case it's a malware/spyware attack.
1. Change your email provider(s) passphrase first, assuming it may be compromised. This is your key to recovering most other accounts if necessary. Make sure 2FA is turned on.
2. Work down the priority list (financial, work, GitHub, etc.) and reset passwords. Turn on 2FA where applicable.
3. Consider using integrated browser password managers (slightly less in-band signalling for such a security-sensitive tool) or your own locally encrypted list which can be synced with version control to other devices.
Time Monday, December 27, 2021 at 3:55 PM EST
Location UNITED STATES
IP address 154.202.117.78
Password is only used for lastpass. It was caught since I use 2FA. I did previously have "The Great Suspender" chrome extension, which changed hands and had an update including malware, I wonder if this was the culprit.
I last changed my master password on November 24, 2017, the previous exploit was apparently resolved in July 2016.
My Evernote account which I don’t use any more is showing logins from Brazil. I’ve disabled and asked for an count deletion. Ive got a bad feeling about this.
Time Monday, December 27, 2021 at 1:29 PM EST
Location São Paulo, SP 01323, BRAZIL
IP address 160.116.231.145
Went ahead and deleted my Lastpass account and changed my password in other password managers.
I contacted their support to check if it’s gone for good, waiting for a reply. Lesson learned, don’t forget to delete password vaults not in use.
account had 2FA set up, but I was able to simply remove it (since I didn't have access to the token anymore)
I rarely say “amazing”, but this is the time.
1. “hardware wallet” level security, with good UX. Maybe a USB/Lightning dongle, but I really wish computers/phones had built-in capability to do hardware wallets. Apple TouchBar got close (I realize it wouldn’t considered be a dedicated hardware wallet).
2. a way to automatically roll passwords periodically (with a small amount of user intervention, per requirement #1). This would require either some excellent AI or crowdsourced automations for every website.
I think that LastPass and 1Password are the ultimate targets for hackers.
Wouldn't surprise me if they got in. Hackers ain't Matthew Broderick, anymore.
EDIT: Deleted somewhat cynical editorializing
https://en.wikipedia.org/wiki/LastPass#2017_security_inciden...
It wasn't so much that that happened, but rather their response:
https://blog.lastpass.com/2017/03/important-security-updates...
- "Our investigation to date has not indicated that any sensitive user data was lost or compromised"
- "No master password change is required"
- "No site credential passwords need to be changed"
Given the fact that an attacker could run code in a user's browser extension without any communication with Lastpass servers, there was no way for them to know whether the master or site passwords had been stolen. The only responsible thing for them to do at that point in my view was to recommend everyone change all their passwords. Instead they completely played it down.
So they completely lost my trust and I spend the next several days moving off Lastpass and changing the passwords for hundreds of websites...I feel for all of you finding yourselves in that situation now. :-(
My master password was a long multi word phrase with numbers and special characters, and was not used for anything except LastPass. I find their claims of credential stuffing suspect.
Edit -- Also had MFA enabled and received the email in November.
I'd also guess the most plausible situation would be malware on your computer that managed to sniff your credentials in-transit/clipboard/memory/browser/keyboard and exfiltrate it to some shady folks.
The other possibility that comes to mind is a man in the middle attack of your password was ever sent over the wire with zero or weak encryption, when someone was snooping, like on coffee shop wifi or even a nosy neighbor on your home wifi.
https://blog.lastpass.com/2021/12/unusual-attempted-login-ac...
"However, out of an abundance of caution, we continued to investigate in an effort to determine what was causing the automated security alert emails to be triggered from our systems. Our investigation has since found that some of these security alerts, which were sent to a limited subset of LastPass users, were likely triggered in error. As a result, we have adjusted our security alert systems and this issue has since been resolved."
[1] https://community.logmein.com/t5/LastPass-Support-Discussion...
installed extensions: ublock origin, OneTab, Lastpass, metamask, cisco webex, edit this cookie
It was definitely a unique password. Last set in 2017, but changed now. I had just purged virtually all the data in the account recently, but it's still frightening.
I don't have experience of any other password management software, so I certainly can't compare and contrast. But I will say Keepass + Dropbox has worked flawlessly for me across desktop, laptop and mobile. The biggest inconvenience I have had is things like manually typing in a Netflix password into a Smart TV when on holiday (just takes time with long passwords with capitals, lowercase, numbers and symbols).
Good questions to ask yourself
Location UNITED STATES IP address 198.23.179.27
Location Frankfurt am Main, HE 60313, GERMANY IP address 168.81.130.131
I saw this on twitter, but cant reply as I am in twit jail: "Exactly the same thing happened to me last night. They tried again literally minutes after I changed the password to something not used on any other form."
same with your desktop. is everything up to date?
- - - - - -
Login attempt blocked Hello,
Someone just used your master password to try to log in to your account from a device or location we didn't recognize. LastPass blocked this attempt, but you should take a closer look.
Was this you?
Account
I also wonder if these cases with 1Password and Bitwarden are related: https://old.reddit.com/r/1Password/comments/rimvc8/constantl... https://old.reddit.com/r/Bitwarden/comments/rmp1c4/what_is_t...
- have you reused your LP master password as a password anywhere besides LP.
- have you entered your LP master password into anything besides a LP login window. (edit: nvm, ya it went into the other PW manager. Without investigating that, not worth pointing the finger at LP and causing enterprise LP account usage chaos).
- Do you enter the LP password into only the browser extension from LP, your phone's LP app, and any other LP-official services when you log into it.
If you can do a yes/no answers, totally clears this up or totally escalates it.
Also: Went to https://support.logmeininc.com/lastpass/help/delete-your-las... and it doesn't actually tell you how to delete the account, just tells you how to recover your password. Methinks this is all a dark pattern.
Hosea 4:6 My people are destroyed from lack of knowledge.
Is stealing the master password this way possible in practice? As far as I know, Chrome extensions cannot inject e.g. JavaScript into tabs and toolbar popups that are owned by Chrome extensions. Random pages and extensions are able to send string/JSON messages to an extension but message sources usually have to be on an allow list + JavaScript `eval` should be disabled in the Chrome extension context.
"The password for this router had been generated using Lastpass."
You can kill existing sessions - see account settings destroy sessions.
Edit: All looks normal my side. No emails, no login attempts, but will change pass just in case
Time Monday, December 27, 2021 at 2:07 PM EST
Location Fair Lawn, NJ 07410, UNITED STATES
IP address 172.245.155.253
Maybe the attacker attempted to use the master password login festure without having the actual correct master password itself, and the email is poorly written.
Not sure why anyone is still using Lastpass though...
Anyone care to replicate?
I think the problem might be a badly-worded email- they may not have your password.
- used a VPN service that was malicious - router is compromised - someone near you was running a MITM device like Stingray (assuming you were using a mobile device away from home) - mobile device had unpatched OS (exploit gains root access via something like binary sms) - your desktop / laptop is compromised
TL;DR keepass can do everything lastpass does, while you still hold all the keys and the data.
Disclaimer: I worked on the 2FA part of the saas pass password manager which never has a master password and always uses passwordless MFA like scanning an encrypted barcode for unlocking the browser extension.
I don't know LastPass, but is it possible to login and see what emails they sent you? Or maybe see a list of login attempts?