.st0{fill:#FFFFFF;}

Last Pass for LastPass? – Ep 389 

 January 13, 2023

By  Donna Grindle

LastPass Breach

The recent breach at the popular password manager, LastPass, has caused a lot of concern amongst its users. We ourselves have discussed whether this is the last pass we are going to give to LastPass. So, in today’s episode, we discuss what happened, what it means for LastPass users and what are some things you should do or consider doing.

A 5 star review is all we ask from our listeners.
1x
Free HIPAA Training
Subscribe to the weekly email update from HMWH

I have read and agreed to your Privacy Policy

In this episode:

The Last Pass for LastPass? – Ep 389

Today’s Episode is brought to you by:

Kardon

and

HIPAA for MSPs with Security First IT

 Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity. 

The Privacy and Security Boot Camp

3.5 day In Person Event

Mar 12, 13, 14 and 15, 2023

PriSecBootCamp.com

Great idea! Share Help Me With HIPAA with one person this week!

Learn about offerings from the Kardon Club

and HIPAA for MSPs!

Thanks to our donors. We appreciate your support!

If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com

Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA

If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!


HIPAA Say What!?!

[08:03]

Lab Pays $16,500 Settlement to HHS, Resolving Potential HIPAA Violation over Medical Records Request

Life Hopes Resolution Agreement and Correction Action Plan | HHS.gov

Access to medical records, including lab results, empowers patients to better manage their health, communicate with their treatment teams, and adhere to their treatment plans. The HIPAA Privacy Rule gives individuals and personal representatives a right to timely access their medical records from all covered entities, including laboratories,” said OCR Director Melanie Fontes Rainer. “Laboratories covered by HIPAA must follow the law and ensure that they are responding timely to records access requests.OCR Director, Melanie Fontes Rainer
[12:55] Jan 22 – 28, 2023

Data Privacy Week – National Cybersecurity Alliance

Listener Question

[14:56]

Got lost in our wonderful documentation system from Oct.

Hello,

Big fan of the podcast. I had a question for you, that’s hard for me to find.

We’re a software engineering company. We have made an app for a hospital. I believe PHI traverses through our app, but no one at our company has access to the actual PHI, in any way, shape, or form. My question is, does our company need to be HIPAA compliant?

Is This The Last Pass for LastPass?

[22:13]

Notice of Recent Security Incident – The LastPass Blog

LastPass finally admits: Those crooks who got in? They did steal your password vaults, after all…

If you are not yet aware, LastPass has had another breach. This is not the first time LastPass has had a breach, and we’ve discussed those in the past.

We both have used LastPass for years and we have always said that we really appreciate the transparency of the company and how they handled the breaches in the past. However, this time we can’t give LastPass a pass.

We waited to discuss this until the dust settled a bit, so that we had a better understanding of what we were dealing with and could distill this down to you, our listeners. Many folks do not follow infosec news like we do, so this may be new information for you. We’ve also had folks asking us what our thoughts are and what they should do in response to the breach.

Let’s take a minute to talk about what we know so far and then we will discuss how we intend to handle this for our own businesses, as well as what we recommend for you to consider.

Back on August 25, 2022, LastPass publicly announced that it had been a victim of a breach a couple of weeks earlier. At that time, part of the announcement read:

Two weeks ago, we detected some unusual activity within portions of the LastPass development environment. After initiating an immediate investigation, we have seen no evidence that this incident involved any access to customer data or encrypted password vaults.

We have determined that an unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account and took portions of source code and some proprietary LastPass technical information. Our products and services are operating normally.

So, already I’m not feeling good about this. They took source code and proprietary technical information? At present, we still do not know what this source code or information might be used for or how it could be weaponized against users. However, according to THIS notice, customer data and encrypted password vaults remain safe.

A follow-up announcement about a month later was similarly concerning:

The threat actor gained access to the Development environment using a developer’s compromised endpoint. While the method used for the initial endpoint compromise is inconclusive, the threat actor utilized their persistent access to impersonate the developer once the developer had successfully authenticated using multi-factor authentication.

That’s right, MFA was in place and it did what it is supposed to do, however the human firewall failed and let the hackers right in.

Let’s fast forward a few months (yes months) to the most recent notice from LastPass about this incident, dated December 22, 2022:

Based on our investigation to date, we have learned that an unknown threat actor accessed a cloud-based storage environment leveraging information obtained from the incident we previously disclosed in August of 2022. While no customer data was accessed during the August 2022 incident, some source code and technical information were stolen from our development environment and used to target another employee, obtaining credentials and keys which were used to access and decrypt some storage volumes within the cloud-based storage service.
To date, we have determined that once the cloud storage access key and dual storage container decryption keys were obtained, the threat actor copied information from backup that contained basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.

The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data.

Great!… just freaking fantastic! Not only does the hacker have my personal information but also an encrypted copy of my LastPass Vault.

[31:40] So, what does this mean for you if you use LastPass? Well, that all depends on the security measures that you personally took BEFORE this breach.

Here are a few things we say all the time that come to mind here…

  • “You can’t fully outsource your own security.”
  • “You should not wait until a security incident to start taking security seriously.”
  • “Nothing is 100% in cybersecurity, you need layers of protection.”

From here, we want to shift our focus on what our recommendations are for those using LastPass. There is plenty we can discuss and speculate about what happened and how it happened, however what is really important for us users is how we should best respond to this.

Is Your Password Vault Safe?

[34:18] As safe as it can be in the loving arms of a hacker 🙂. Depending on how good your vault password was will be very important here. If you had an easy password, a password that has been breached in the past, or a password that is part of any known-password list, you probably should be worried.

Even if you had a very strong password, you are now facing the possibility of hackers trying to get to you to get you to give up the credentials to your vault. That means more targeted spam, phishing, smishing, and vishing. Since the hackers can see the URLs in your LastPass account, it will be fairly easy to figure out if you are worth their time to target.

As an example, LastPass Account #1 has some gaming sites, a school site, and some porn sites. LastPass Account #2 has three different banking sites, a few credit card sites, and dozens of business and shopping sites. Which do you think looks like the best use of the hackers time and resources?

What Should You Do?

[42:03] Here is our checklist of things we recommend you do or consider:

  • Change your LastPass master password
    • Make sure it is strong
    • Never use it anywhere else
  • Change the passwords stored inside your vault
  • Change your Password Iterations setting to 310000
  • Setup 2FA/MFA everywhere you can
  • Be very suspicious of everything that “smells funny”
  • Whether you decide to move to a different password manager or stay with LastPass, you should have a documented assessment of your decision

We still think password managers are a great tool and maybe even necessary. Like everything that contains sensitive information, it should be well protected. Even better is that you have other layers of security so that even if someone had your passwords, they still could not gain access to your most critical data and sites.

If you haven’t conducted an assessment lately of how your organization creates, uses, stores, accesses, and manages passwords, now is the time. Implementing a password manager for users across your organization is much safer than users who create spreadsheets with their passwords or write them all down in their “password book”.

Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!

HIPAA is not about compliance,

it’s about patient care.TM

Special thanks to our sponsors Security First IT and Kardon.

HelpMeWithHIPAA.com Is A
Collaborative Project

Created & Sponsored By: