LastPass Security Incident – Actions to Take

December 23, 2022 | Alerts

Update 3/1/2023: LastPass provided more technical details about the incident and more recommendations to take, see more information below.

LastPass, the provider of a password manager & vault security product used by some at UCI, experienced a cybersecurity incident in August of this year.  At that time, they reported no impact to customer information and no impact to customer password vaults.  

Yesterday, LastPass unexpectedly announced that customer information (company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses) and encrypted password vaults were stolen.

Risks

  • We don’t know if a subset or all of their customers are affected, but we are assuming the worst case scenario.
  • While the stolen password vaults are encrypted with each user’s master password, there is a possibility the master password could be cracked and decrypted over time via brute-force methods, with master passwords that are shorter in length being more vulnerable.
  • Since the threat actor has an offline copy of the encrypted vault, UCI multi-factor authentication would not protect against such brute-force cracking.
  • LastPass also revealed that the website URL is not encrypted within the vault, only the username, password, and notes fields are.
  • Since the threat actor also obtained customer names and email addresses, there is increased risk of them sending phishing messages to trick you into giving them your master password.

Actions to Take

  • A strong master password (see password strength resources below) should make it very difficult and take a very long time to crack any stolen encrypted vault, however practicing due diligence is always a good idea.
  • Whether you use a personal LastPass account, or the UCI-provided LastPass Enterprise account, we recommend you change your LastPass master password to a new unique value that is at least 12 characters long, the longer the better.
  • Never provide your master password (or any password) to anyone, if anyone asks you for it contact OIT Security immediately.
  • We recommend changing any high value passwords stored within LastPass within a reasonable timeframe and enable multi-factor authentication on them where possible as well.
  • If you had a weak master password and also stored any personally identifiable information in a LastPass Secure Note, you may also want to consider these identity theft protection tips.

More Information

Password Strength Resources

Alerts

Fraudulent bank accounts hit UCI community

Sent on 8/30/2023 to All Campus Employees and Students by the Office of Data and Information Technology UCI Information Security reports “a new wave of fraudulent activity” tied to Chime and Go2Bank. Unauthorized accounts have been opened using UCI members’ personal...

Chime and Go2Bank Fraudulent Activity

We have seen a new wave of fraudulent activity related to UCI members coming from Chime and Go2Bank. This includes accounts being opened using a UCI member's personal information by unauthorized individuals, and getting notified of that via their UCI email, personal...

News & Announcements

DMARC Email Security Compliance

Major email providers have announced that they have started enforcing DMARC/DKIM/SPF email security standards in order to send email to them. What that means to us is that external email providers will increasingly block or mark as spam email coming from UCI unless...

Data Disposal Day – October 25, 2023

Date: Wednesday, October 25, 2023 Time: 8:00 AM- 12:00 PM (or until truck hits full capacity) Location: Parking Lot 12A near the Natural Sciences buildings Each of us is responsible for the security of information assets with which we work. Properly...