LastPass bug could have let hackers steal your passwords
The popular password manager LastPass has released a patch for a bug that would have allowed malicious websites to extract passwords that were previously entered using the service's browser extension.
The bug was first discovered by Google Project Zero researcher Tavis Ormandy who disclosed the vulnerability to the company early enough that it could release a patch before it was exploited in the wild.
LastPass has since fixed the issue by deploying an automatic update to all browsers but it still recommended that users verify they're running the latest version of the software.
The bug itself works by luring users to visit a malicious website where their LastPass browser extension is tricked into using a password from a previously visited website. According to Ormandy, attackers could even use a service such as Google Translate to disguise a malicious URL and trick unsuspecting users into visiting a rogue site.
LastPass bug
The update should be applied to LastPass automatically according to the company but it is still worth checking to see if you're running the latest version of the service's browser extension. This is especially true for users who are running a browser that allows you to disable automatic updates for extensions.
Version 4.33.0 is the latest version of the extension and according to LastPass, Chrome and Opera are the only web browsers that are vulnerable. However, the company has deployed its latest patch to all browsers as a precautionary measure. In a blog post, security engineering manager at LastPass, Ferenc Kun downplayed the severity of the bug, saying:
“To exploit this bug, a series of actions would need to be taken by a LastPass user including filling a password with the LastPass icon, then visiting a compromised or malicious site and finally being tricked into clicking on the page several times. This exploit may result in the last site credentials filled by LastPass to be exposed. We quickly worked to develop a fix and verified the solution was comprehensive with Tavis.”
In the same way that software should be patched to the latest version, so to should browser extensions as cybercriminals are always looking for new ways to gain access to user credentials and other sensitive information.
source techradar
Industry: Cyber Security
Latest Jobs
-
- PCI QSA needed. Discreet Opportunity | London | Client facing
- London
- N/A
-
CH08421 PCI QSA needed. Discreet Opportunity | London | Client facing. Payment Card Industry - Qualified Security Assessor - London Seeking someone looking to accelerate their career, into a variety of interesting clients / projects. Must be happy to be onsite with clients- this is not a fully remote role. You must currently hold a valid CISSP or CISM or ISO27001 lead implementer certification AND one of the following; CISA, GSNA, iso27001 lead Auditor, CIA or IRCA ISMS auditor+ Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Security Operations / information Security Analyst / Engineer. London
- London
- N/A
-
Security Operations / information Security Analyst / Engineer needed for a London opportunity. A technical hands on role to investigate, escalate and proactively work to protect a globally recognised brand. Someone with SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Security Cleared Penetration Tester: United Kindom
- N/A
- N/A
-
Security Cleared Penetration Tester Deliver technical Penetration tests to the NCSC CHECK standard. Active CHECK Member or Leader status desirable either in Web Application or Infrastructure. Reach out to find out more. Whatsapp directly here https://wa.me/message/6USF5RAQBOZIP1 Or apply today