Weekend Argus (Saturday Edition)

Password theft evolves at dizzying speeds

-

WASHINGTON: Millions of people count on password managers to safeguard their accounts and help them keep track of their passwords. By serving as a sort of master-key for their accounts, password managers can encourage good digital hygiene, such as using long, complex and unique passwords.

But a major vulnerabil­ity in one of the most popular password managers, LastPass, shows how even the tactics users hope will protect them online can still leave them vulnerable – and how just hard it is to keep up with what technology to trust.

Tavis Ormandy, a member of a Google team that hunts for unknown software bugs, discovered the LastPass problem this week, calling it a “complete remote compromise”. A distant attacker could potentiall­y take over users’ LastPass accounts and gain access to their troves of passwords – at least, if they visited a website designed to exploit the vulnerabil­ity while using the LastPass browser extension with Firefox, according to a blog post from LastPass.

LastPass pushed out an update on Wednesday fixing the problem. It also acknowledg­ed an issue that similarly exposed user passwords and was disclosed to LastPass by security researcher Mathias Karlsson last year.

The company fixed the problem Karlsson discovered when he told them about it, but it wasn’t made public until Wednesday when Karlsson published a blog post explaining the bug. Industry best practice is for researcher­s to wait until after problems have been fixed to talk about them, but companies don’t always announce when they’ve made major correction­s.

This isn’t the first time password managers have had security problems. In 2014, researcher­s uncovered security problems in LastPass and four other password managers. Last year, researcher­s were able to sneak a malicious program into the Apple App Store that could steal passwords from iOS and OSX’s built-in Keychain password management tool, as well as from popular password manager 1Password.

Earlier this week, a government agency also waved developers away from another common account security strategy: using SMS text messages to deliver two- factor authentica­tion codes. Two-factor authentica­tion is one of the best, basic steps people can take to secure their accounts. It works by having a user verify their identity by using another method beyond a password, most often by entering a code sent to them via SMS.

But the National Institute of Standards and Technology argues using SMSes for two-factor authentica­tion shouldn’t be considered secure because the number associated with an account might change hands or the code might be intercepte­d if sent to a number registered through an online service, including Skype or Google Voice. Instead, the guidance suggests alternativ­es such as using secure apps for two-factor authentica­tion, already offered through Google. – Washington Post

Newspapers in English

Newspapers from South Africa