Just happened to me one hour ago and got scared shitless.
Time Monday, December 27, 2021 at 3:50 PM EST
Location UNITED STATES
IP address 107.173.195.83
Actions taken, in this order:
- Head to *Advanced Options* -> *View account history* to see if anything suspicious is going on (nothing so far)
- Disable Lastpass MFA and use Google Authenticator (Authy)
- *Account Settings* -> click on *Show Advanced Settings* -> *Destroy Sessions* (to see if anyone is actively logged in)
- *Account Settings* -> click on *Show Advanced Settings* -> *Country Restriction* to my country only (luckily not in the US as the bot was)
- Change Master Password
Also moments earlier:
- Investigating all Mac processes
- Disabled all Chrome extensions and deleted most (should have made a list)
Let's hope it's not as bad as it seems.
Edit#1 | Following IP addresses are reported in the thread so far:
One other thing to note is that by default lastpass allows reverting to your previous password for 30(?) days. The option is in account settings -> advanced -> "Allow master password changes to be reverted".
To be safe you would probably want to disable that then change your password again. Just don't lose your new password as you then can't revert.
You received a "Someone just used your master password to try to log in to your account from a device or location we didn't recognize" email?
And your master password was secure/not used anywhere else, etc.?
Did we all (that's 8 of us now in the thread) get compromised a few years ago (using the LastPass extension?) and someone just mass attempted to try all of those passwords..?
Edit: since you're tracking IPs found in this thread (thanks!) my attacker's was 160.116.189.21 . You also have 1 ip duplicated (160.116.88.235) which was from the same user both times. You can also add 160.116.95.249 which was just posted
"Someone just used your master password to try to log in to your account from a device or location we didn't recognize. LastPass blocked this attempt, but you should take a closer look."
Could be... I haven't rotated my password in a while. Could you link me to more info about the LastPass compromise that you mentioned?
p.s. My master password is definitely not dictionary material, and it's not used anywhere else, so I am 100% sure it's not a bruteforce / phishing attempt.
Most of it was initially obtained via fraud/corruption from AFRINIC and being currently announced by AS202425 (Ecatel, notorious crime host). Whoever is using it is up to no good.
The rest is owned and announced by ColoCrossing which could be considered a legit ISP by some metrics, but also has an extensive history of hosting lots of shady stuff.
- Disable Lastpass MFA and use Google Authenticator (Authy)
could you please explain this point? Isn't LastPass Authenticator equivalent to Google Authenticator, Authy or any other TOTP app? Or is there something that makes it less secure than other apps? Perhaps because it has cloud backups?
Honestly after the scare it just seemed stupid that I chose LastPass' own MFA for my LastPass account. Also if they really did get exploited, no idea what it means for their MFA solution.
When you do authy (or google auth) it will generate a new set of keys for you and shutdown any old ones associated with the lastpass stuff thus making the old keys useless. Also obviously he should change his master password to a new one.
How so? Are you saying that if I sign up for example to Dropbox and use Lastpass Authenticator for the 2FA, there is a way for me to log into Dropbox without retrieving the code from LastPass Authenticator? How would that work?
This is my worst nightmare and I wonder what the order of operations is in terms of downloading and unlocking a vault. This sounds like you need the master password to download and unlock the vault, so that’s a tiny bit of extra protection I guess (not much).
I wonder if password managers should be designed around, and encourage the use of, an undocumented PIN that’s appended to every stored password. You could use the same PIN for everything and if someone got your vault decrypted there would at least be a chance they didn’t get the secondary PIN too.
Can't use the same PIN as a hacker would just add myhackurl.com/login to your vault and see what the PIN came across as. I think you'd also run into issues with password length as a lot of sites still have a restriction. I like the idea though and maybe a different implementation could work.
I mean a PIN that's not stored in the vault or auto-filled. It would be something extra that you add manually after the password manager fills in the password
So the password manager would put in 'password' and I'd manually type '1234' to make it 'password1234'.
That would not have stopped the vulnerability 'LastPass bug leaks credentials from previous site' (see Zdnet article posted elsewhere) though that's not a common vulnerability in software.
It's not the most scientifically accurate method, but a few people and I are trying to rule out / determine which software in common all of us might have. Thanks!
Edit#1 | Following IP addresses are reported in the thread so far: