Hack mitigation:

If you're a Lastpass user, even if you're planning on leaving, it'll take some time to do so.

1. Enable MFA, preferably a good one like hardware keys or authenticator apps.
2. Lock down LastPass access to only the countries you expect to be in in the near term. You can do this through the web advanced settings tab.
3. Prohibit access from tor networks unless you're typically using them.
4. Increase your 'password iterations' value to something OVER 600,000.

@0x56 Sure thing. Another note for those not technically-inclined... if you look at your LastPass advanced configuration (under Account Settings/Show Advanced Settings) and see that your Password Iterations setting is one of the legacy defaults (e.g.1, or 500, or anything less than 100,100) then YOU are the low hanging fruit. Not only do you need to bump up iterations to a minimum of 300,000 (or better yet, 600,000 as @0x56 suggests), but you REALLY SHOULD change all passwords that matter ASAP.

@codeWhisperer @0x56
Never having used LastPass, I'm curious why increasing iterations would take any significant time.

On you just log into the web vault, and change the setting. All logged-in devices are deauthed until you manually log into them again

But see the 'solution' post here that explains why increasing the *length* of your master password is much more effective than increasing iterations in resisting cracking:

community.bitwarden.com/t/wher

@voltronic @codeWhisperer - increasing the iterations makes it that much more expensive to brute force. Current OWASP recommendations is 600,000 or more. Increasing the length of the password makes it harder to crack (assuming no hashing collisions)

The reason (this is my theory) it takes so long is that it had to reencrypt everything, most likely individually.

Follow

@0x56 @voltronic My sources were all showing the OWASP recommendation to be 310,000, but I can see now that they have ~doubled it to 600,000 in the last few weeks, so thanks for posting this number.

As for the time cost, I agree with you. After hashing your master password (now hopefully 600,000 times or more) your local data will be re-encrypted with that result. This is a scary proposition. If something interrupts the process (crash, etc.) you will likely be well and truly screwed. (cont'd)

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.