Our local encryption/decryption to keep your sensitive data out of our hands depends on it.
We do not recommend you attempt to login without JavaScript enabled
Securely save passwords and automatically log into any site on the internet.
It offers multi-protocol support including FIDO2, Yubico OTP, OATH HOTP, U2F, PIV, and Open PGP. Users have the broadest options for strong authentication including not only two-factor authentication, but also support for single factor passwordless login and multi-factor.
LastPass Universal Windows Installer
The Universal Windows installer installs browser extensions for Internet Explorer, Edge, Chrome, Firefox, and Opera.
Lastpass still doesn't support FIDO/FIDO2 based security keys (except for the YubiKeys' OTP feature). The last response from the team was 'we're working on it' over 11 months ago. Titan has released a new key that does support FIDO2 and yet, you have not enabled support for any other keys except YubiKey's TOTP feature. Open the LastPass for Windows Desktop application and log in with your LastPass email and Master Password. Select Applications in the left navigation. Hover over the application, then click Launch. Click within the username field of your application, then hold CTRL + ALT + F on your keyboard. LastPass keeps your information private, secure, and hidden (even from us). People Trust LastPass. Businesses Use LastPass. Average Rating on the Chrome Web Store. Based on 27,600 Reviews.
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Firefox
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc.
LastPass for Microsoft Edge
If you're using Chromium-based Microsoft Edge, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Microsoft Edge Legacy
If you're still using an older version of Microsoft Edge not based on Chromium, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Firefox
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc.
LastPass for Safari
LastPass browser extension for Apple Safari. This is a Mac App which includes the Safari extension. Click here for installation help.
LastPass for Microsoft Edge
If you're using Chromium-based Microsoft Edge, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass Mac App
The LastPass vault you love for macOS. This is the same Mac app that includes the LastPass browser extension for Safari. Click here for Safari extension installation help.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass Universal Linux Installer
The Universal Linux installer installs browser extensions for Firefox, Chrome, and Opera.
LastPass for Firefox (i386 and x64)
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc. If you experience issues, try starting Firefox in safe mode.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for iPhone/iPad
LastPass for Android
Want even more LastPass?
View a history of our changes in our release notes.
If you experience issues with the latest release, please contact us.
I'll say it upfront for the techy people: (un)fortunately, this is NOT a MITM attack of U2F*. LastPass doesn't support U2F so this is disappointingly simple. It uses Yubico OTP, which is phishable.
In this article, I demonstrate how to deploy a phishing attack on LastPass users, even when they are protected with Yubikey physical keys. I hope that this helps you appreciate that YubiKey ≠ U2F. Aside from that, I will give an overview of:
- what is U2F, and why it is important
- how LastPass encrypts and handles your vault
*U2F stands for 'Universal 2nd Factor'. This is the protocol that is likely used whenever you hear about security keys.
Use security keys to prevent phishing
Google's transparency report [1]
In recent years, phishing has proven to be one of the most effective ways of hacking people. Instead of using a fancy new exploit to steal a victim's credentials, the hacker just asks the victims to hand their credentials over.
Moreover, with the new remote working conditions, we are more at risk of phishing attacks. This results in headlines such as 'Phishing Attacks Increase 350 Percent Amid COVID-19 Quarantine (2020)' [2].
How do we combat this? Aside from educating employees on phishing attacks, security keys are an effective way to mitigate this increased risk. We see success stories such as (2018, Google: Security Keys Neutralized Employee Phishing):
'We have had no reported or confirmed account takeovers since implementing security keys at Google' [3]
In a phishing attack, the weak point is the human user. The user has the responsibility to distinguishing legitimate vs malicious sites. By using security keys and protocols such as U2F, you relieve some of this burden from the user. Using U2F, authentication 'magically' doesn't work when it is a malicious site, even when the victim is tricked.
Below we see LastPass endorsing the use of YubiKeys. In the diagram, we see that YubiKey is more secure, easy to use, and not phishable.
With that said, I recently got myself some Yubikeys. To use this 'Advanced Multi-factor Option' with Lastpass, I needed a premium account. Being a long time user of Lastpass, I didn't think twice and paid to upgrade to premium.
Within minutes, I felt shortchanged. It quickly became obvious that using a Yubikey did not make my LastPass vault any more secure against phishing.
Why? Lastpass's integration with Yubico using Yubico OTP and not U2F.
Here's a list of levels of auth from the 'the Hierarchy of Auth'[18] from least secure to most secure:
- Password alone
- Password and SMS
- Password and soft token (LastPass + Google Authenticator)
- Password and hard token (LastPass + Yubico OTP)
- Password and U2F (Security Keys)
(3) and (4) give similar protections against phishing. (5) mitigates phishing best. So although we are using a Yubikey, we aren't using it as a security key*.
Is this important and is U2F really THAT more secure?
Let me show you why this is important.
*Let's reserve the term 'security key' only when using U2F. So a YubiKey 5 can be used both in an OTP mode and security key mode.
How to deploy phishing campaign
Let's take a red team mindset to appreciate why phishing is so effective and how easy it is for us to fall for it. We use a reverse proxy to do a 'man-in-the-middle' (MITM) attack to steal the credentials and bypass 2 Factor Authentication (2FA).
Here's an overview of how a MITM attack works.
We're nice people. We will log-in LastPass for you 😊
Of course, phishing using MITM applies to many other sites. What makes LastPass unique is that it is the only site that I personally use that is still vulnerable to MITM even when using a Yubikey.
Information Gathering
Let's say you have to target an individual or a company. You first try to get a small collection of email addresses from searching through LinkedIn, Github, Twitter, blogs, and other OSINT sources.
Now with these target emails, you explore the options available for your attack. The LastPass vault is a gold mine of credentials since one phishing attack can result in many credentials. Let's see if these emails are possible LastPass users.
google@gmail.com uses Lastpass?
Since the registration processes would check the availability of an email address, we can use it to gather more intel. If the email address is taken, then it is likely that the owner uses LastPass.
If you want to enumerate a small list of potential targets, then you can use this simple API which returns ok/no.
For targeted attacks, this is an effective way to check whether or not you can be phished on LastPass. Broader random attacks would be unlikely if the availability endpoint is rate limited.
Getting the right domain
Having a legitimate-looking domain might make it easier to trick the victim. There are a lot of ways that we can gain a legitimate-looking domain. Maybe slight modifications of the spelling or explore other TLDs. We chose lastpass.com.es
As of 2020/05/25
Here are other examples of possible phishing domains for LastPass.
As of 2020/05/25
These are domains that are affordable for a red team and individual hackers.
I hope you realize that in cases such as this one, a domain like lastpass.com.es
is as suspicious as lastpaazz.com
and lastpass.club
.
Setting up the servers
To set up our phishing site I've prepared a fork of evilginx2, which has some additional logic to steal the credentials from LastPass.
This is a golang application, so you would need to install golang and run the following commands:
It is surprising how mature the phishing tools are. The development of this only took around just a day. It is easy to set up phishing sites for your bank, or company website, complete with domain and SSL.
You can set this up on your favorite cloud hosting provider. After setting up the binaries of evilginx2. You run it and then configure the LastPass phishlet.
And then you create the link you want to bait them. The redirect_url
is the page you want the victim to end up once you get all the necessary credentials.
In our case, we want our victim to go https://lastpass[.]com[.]es/QBFlGqJy
Note: For this to work locally you might need to add the following to /etc/hosts
Sending the Phishing Email
Assuming that you use an existing phishlet, then we have to make a phishing email. This is really where a lot of the work comes in. You have to somehow trick the user into clicking the link. Crafting a good phishing email is an art.
In this case, we say that we have revoked trusted devices so that hopefully, he won't be surprised just in case he gets alerts of new log-ins.
Lastpass Hardware Key
Waiting for the credentials
When the victim clicks on the link, he will be redirected to the fake LastPass login.
Notice lastpass.com.es
And when LastPass requires 2FA, then the fake website will ask the victim to provide the second factor.
As previous work [4] has mentioned, the victim will likely have to verify with their email because the logon activity is new. However, this might look less suspicious if we have already primed the victims to expect this by saying we've 'revoked trusted devices'.
Screenshot from Versprite's article [4]
Once the session is trusted, the victim's browser will start to download the encrypted vault. We steal this using the proxy along with the username and password of the victim.
Afterward, the victim will be redirected a some chosen site. In this case, the victim will be redirected to your chosen page.
Meanwhile, we have all that we need to get all the victim's credentials.
Decrypting the vault
To decrypt the LastPass Vault, you would need 3 main ingredients:
- LastPass Username
- LastPass Password
- Encrypted Vault
With a MITM, we can steal the victim's username and password, and once the session is trusted after OTP from the YubiKey, we can download the encrypted vault.
The original intention of the evilginx2 is to hijack the session. But I've found that it is easier to just dump the credentials in the vault. In theory, the proxy can get all necessary information to take takeover of the account.
In the project, I've provided a script scripts/lastpass-python/dump_lastpass.py
This parses the evilginx2 DB and decrypts the credentials. The location of the DB depends on where the config file is. In my case it was /var/root/.evilginx/data.db
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Firefox
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc.
LastPass for Microsoft Edge
If you're using Chromium-based Microsoft Edge, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Microsoft Edge Legacy
If you're still using an older version of Microsoft Edge not based on Chromium, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Firefox
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc.
LastPass for Safari
LastPass browser extension for Apple Safari. This is a Mac App which includes the Safari extension. Click here for installation help.
LastPass for Microsoft Edge
If you're using Chromium-based Microsoft Edge, this one's for you. LastPass browser extension for Microsoft Edge without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass Mac App
The LastPass vault you love for macOS. This is the same Mac app that includes the LastPass browser extension for Safari. Click here for Safari extension installation help.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass Universal Linux Installer
The Universal Linux installer installs browser extensions for Firefox, Chrome, and Opera.
LastPass for Firefox (i386 and x64)
LastPass browser extension for Mozilla Firefox. This will also work on other Mozilla based browsers such as SeaMonkey, Mozilla, etc. If you experience issues, try starting Firefox in safe mode.
LastPass for Chrome (full version)
LastPass browser extension for Google Chrome (full version) provides extra features such as sharing the login state with other browsers.
LastPass for Chrome
Features dependent on a binary component, such as sharing of login state with other browsers, will not function.
LastPass for Opera
LastPass browser extension for Opera without a binary component. Features dependent on a binary component, such as automatic logoff after idle and sharing of login state with other browsers, will not function.
LastPass for iPhone/iPad
LastPass for Android
Want even more LastPass?
View a history of our changes in our release notes.
If you experience issues with the latest release, please contact us.
I'll say it upfront for the techy people: (un)fortunately, this is NOT a MITM attack of U2F*. LastPass doesn't support U2F so this is disappointingly simple. It uses Yubico OTP, which is phishable.
In this article, I demonstrate how to deploy a phishing attack on LastPass users, even when they are protected with Yubikey physical keys. I hope that this helps you appreciate that YubiKey ≠ U2F. Aside from that, I will give an overview of:
- what is U2F, and why it is important
- how LastPass encrypts and handles your vault
*U2F stands for 'Universal 2nd Factor'. This is the protocol that is likely used whenever you hear about security keys.
Use security keys to prevent phishing
Google's transparency report [1]
In recent years, phishing has proven to be one of the most effective ways of hacking people. Instead of using a fancy new exploit to steal a victim's credentials, the hacker just asks the victims to hand their credentials over.
Moreover, with the new remote working conditions, we are more at risk of phishing attacks. This results in headlines such as 'Phishing Attacks Increase 350 Percent Amid COVID-19 Quarantine (2020)' [2].
How do we combat this? Aside from educating employees on phishing attacks, security keys are an effective way to mitigate this increased risk. We see success stories such as (2018, Google: Security Keys Neutralized Employee Phishing):
'We have had no reported or confirmed account takeovers since implementing security keys at Google' [3]
In a phishing attack, the weak point is the human user. The user has the responsibility to distinguishing legitimate vs malicious sites. By using security keys and protocols such as U2F, you relieve some of this burden from the user. Using U2F, authentication 'magically' doesn't work when it is a malicious site, even when the victim is tricked.
Below we see LastPass endorsing the use of YubiKeys. In the diagram, we see that YubiKey is more secure, easy to use, and not phishable.
With that said, I recently got myself some Yubikeys. To use this 'Advanced Multi-factor Option' with Lastpass, I needed a premium account. Being a long time user of Lastpass, I didn't think twice and paid to upgrade to premium.
Within minutes, I felt shortchanged. It quickly became obvious that using a Yubikey did not make my LastPass vault any more secure against phishing.
Why? Lastpass's integration with Yubico using Yubico OTP and not U2F.
Here's a list of levels of auth from the 'the Hierarchy of Auth'[18] from least secure to most secure:
- Password alone
- Password and SMS
- Password and soft token (LastPass + Google Authenticator)
- Password and hard token (LastPass + Yubico OTP)
- Password and U2F (Security Keys)
(3) and (4) give similar protections against phishing. (5) mitigates phishing best. So although we are using a Yubikey, we aren't using it as a security key*.
Is this important and is U2F really THAT more secure?
Let me show you why this is important.
*Let's reserve the term 'security key' only when using U2F. So a YubiKey 5 can be used both in an OTP mode and security key mode.
How to deploy phishing campaign
Let's take a red team mindset to appreciate why phishing is so effective and how easy it is for us to fall for it. We use a reverse proxy to do a 'man-in-the-middle' (MITM) attack to steal the credentials and bypass 2 Factor Authentication (2FA).
Here's an overview of how a MITM attack works.
We're nice people. We will log-in LastPass for you 😊
Of course, phishing using MITM applies to many other sites. What makes LastPass unique is that it is the only site that I personally use that is still vulnerable to MITM even when using a Yubikey.
Information Gathering
Let's say you have to target an individual or a company. You first try to get a small collection of email addresses from searching through LinkedIn, Github, Twitter, blogs, and other OSINT sources.
Now with these target emails, you explore the options available for your attack. The LastPass vault is a gold mine of credentials since one phishing attack can result in many credentials. Let's see if these emails are possible LastPass users.
google@gmail.com uses Lastpass?
Since the registration processes would check the availability of an email address, we can use it to gather more intel. If the email address is taken, then it is likely that the owner uses LastPass.
If you want to enumerate a small list of potential targets, then you can use this simple API which returns ok/no.
For targeted attacks, this is an effective way to check whether or not you can be phished on LastPass. Broader random attacks would be unlikely if the availability endpoint is rate limited.
Getting the right domain
Having a legitimate-looking domain might make it easier to trick the victim. There are a lot of ways that we can gain a legitimate-looking domain. Maybe slight modifications of the spelling or explore other TLDs. We chose lastpass.com.es
As of 2020/05/25
Here are other examples of possible phishing domains for LastPass.
As of 2020/05/25
These are domains that are affordable for a red team and individual hackers.
I hope you realize that in cases such as this one, a domain like lastpass.com.es
is as suspicious as lastpaazz.com
and lastpass.club
.
Setting up the servers
To set up our phishing site I've prepared a fork of evilginx2, which has some additional logic to steal the credentials from LastPass.
This is a golang application, so you would need to install golang and run the following commands:
It is surprising how mature the phishing tools are. The development of this only took around just a day. It is easy to set up phishing sites for your bank, or company website, complete with domain and SSL.
You can set this up on your favorite cloud hosting provider. After setting up the binaries of evilginx2. You run it and then configure the LastPass phishlet.
And then you create the link you want to bait them. The redirect_url
is the page you want the victim to end up once you get all the necessary credentials.
In our case, we want our victim to go https://lastpass[.]com[.]es/QBFlGqJy
Note: For this to work locally you might need to add the following to /etc/hosts
Sending the Phishing Email
Assuming that you use an existing phishlet, then we have to make a phishing email. This is really where a lot of the work comes in. You have to somehow trick the user into clicking the link. Crafting a good phishing email is an art.
In this case, we say that we have revoked trusted devices so that hopefully, he won't be surprised just in case he gets alerts of new log-ins.
Lastpass Hardware Key
Waiting for the credentials
When the victim clicks on the link, he will be redirected to the fake LastPass login.
Notice lastpass.com.es
And when LastPass requires 2FA, then the fake website will ask the victim to provide the second factor.
As previous work [4] has mentioned, the victim will likely have to verify with their email because the logon activity is new. However, this might look less suspicious if we have already primed the victims to expect this by saying we've 'revoked trusted devices'.
Screenshot from Versprite's article [4]
Once the session is trusted, the victim's browser will start to download the encrypted vault. We steal this using the proxy along with the username and password of the victim.
Afterward, the victim will be redirected a some chosen site. In this case, the victim will be redirected to your chosen page.
Meanwhile, we have all that we need to get all the victim's credentials.
Decrypting the vault
To decrypt the LastPass Vault, you would need 3 main ingredients:
- LastPass Username
- LastPass Password
- Encrypted Vault
With a MITM, we can steal the victim's username and password, and once the session is trusted after OTP from the YubiKey, we can download the encrypted vault.
The original intention of the evilginx2 is to hijack the session. But I've found that it is easier to just dump the credentials in the vault. In theory, the proxy can get all necessary information to take takeover of the account.
In the project, I've provided a script scripts/lastpass-python/dump_lastpass.py
This parses the evilginx2 DB and decrypts the credentials. The location of the DB depends on where the config file is. In my case it was /var/root/.evilginx/data.db
This creates two files, one for credentials of the LastPass accounts, and the other is the credentials found in the vaults. You have everything in the vault, name, folder, username, password, URL, and secure notes associated with the item.
creds-dump.csv
You can easily leverage this to try to take control of as much of the accounts that you can. To maximize your impact, you can write a script to automatically check if there are recovery codes in the notes. With the passwords and the recovery codes, you will have full control of their accounts.
Should we put all our eggs in one basket?
Quick Notes on Phishing
Again, this problem is not specific to LastPass. You can be phished on almost any site you use. Some of them would have fewer protections than LastPass. However, among the main password managers, I think LastPass is the only one who still doesn't support U2F.
How do we detect a phishing email?
It is trivial for an attacker to copy the design of an email. In our example, you might be able to detect it using the source domain. Although sometimes even the domain can be spoofed if not configured properly.
Aside from the domain, the actual content is the only 'fishy' thing.
As for the phishing website itself. Gone are the days where phishing websites do not have SSL certificates [15].The only thing that would give it away is the domain. Because of our MITM proxy, what the victim sees is the exact clone of the actual site. There would be no visual differences and it is practically undetectable in the short term.
What are some ways you can protect yourself at this point?
If you use your password manager's browser extension, it will not give you the password because it doesn't recognize the domain.
The password manager looks solely at the domain of the site and doesn't care whether or not it looks like FB, Twitter, Github, or Google. For example, github.com
not the same as giithub.com
. So if you are at giithub.com
the password manager won't give any credentials to give you.
Why doesn't my password manager show my Github credentials?!?! Is it broken?
The special case for this would be your password manager yourself! It is one of the only sites that I manually input my password. So it is still a prime target for phishing.
How can this happen?
'I thought if we use security keys we can prevent phishing?'
Well that is only true if we are using U2F or some sort of challenge-response protocol. Unfortunately, as we've previously mentioned, LastPass's integration with Yubikey is using the Yubico OTP.
The difference between Yubico OTP and U2F is subtle. In terms of user experience, they are very similar.
You are given a prompt, you insert your Yubikey, and you press the button. Now you're in!
'Insert your key and touch it'
When it comes to using NFC on mobile, the experience is exactly the same!
U2F [7]
The user experiences here are comparable, however, the level of security is not! The differences here are all greatly invisible to us as end-users.
For this part we somewhat simplify our terminology. In the end, we want to generate some 'authentication code', whether it is OTP or U2F. The way we generate this authentication code makes all the difference.
OTP Generation
Yubico OTP, Google Authenticator, SMS Codes, Email Codes, and RSA tokens, all generate their authentication codes in a linear fashion.
If we look at this slide from [5], the flow of information is always moving in one direction. The authentication code is generated independently of the identity of the destination.
Jen Tong, Security Keys are Awesome. [5]
In the same way that you can accidentally put the OTP from the wrong site when using Google Authenticator, you can also inadvertently give this OTP to the attacker.
If you look at how the Yubico OTP is generated [16], it is clear that the codes are generated independent of the identity of the destination. So that means whether or not the destination is the real site, the codes generated are always valid.
OTPs Explained [16]
The risk of phishing is always going to be high as long as:
- The identity of the destination is not included in the generation of the authentication code
- The generation and submission of the authentication code is not fully automated
For example, codes generated by Google Authenticator are specific to the destination site. However, since the user has to submit this manually, then there is room for human error. If we can somehow remove the human in the process and have the application submit the code only for the intended destination, then this would be more secure.
U2F and Security Keys
If the human is the biggest vulnerability in a phishing attack, then we should just remove the human in the process.
This is what U2F tries to do. We relieve the human the burden of identifying between fake and real sites. This is going to be taken care of by the YubiKey and the browser working together.
If you look at the diagram below, we see a desirable end to end flow, and for the most part, this happens automatically end to end. In U2F, whenever the security key generates an authentication code, it is partly derived from the identity of the destination.
We will start to oversimplify here. To make the 'main idea' clear, there are details we will not show in the diagrams below, such so the 'challenge' which is used to prevent replay attacks and it is proof of timeliness.
Here is an even more simplified view of the diagram above. Notice that we have completely removed human in the drawing and that the authentication code uses the identity of the server it is talking to. This addresses our concerns with OTP codes.
So whenever an attacker tries to put himself between the victim and the site, the codes that will be generated will no longer be valid. For our phishing attack, the codes will be valid only forlastpass.com.es
and not lastpass.com
.
Since in step (2), the attacker asks for lastpass.com.es
, the authentication produced in step (3) code cannot be used for lastpass.com
. So why doesn't the attacker just ask for authentication code for lastpass.com
?
This won't be possible because the browser would not allow it.
The browser checks the certificates of the website, before it asks the security key to generate any codes. It makes sure doesn't allow our fake websitelastpass.com.es
to get codes for lastpass.com
. This makes it difficult for a hacker to do a MITM attack. The site not only has to look like the legitimate site, but it also has to have to correct certificates.
(Of course, if the hacker has legitimate certificates, maybe through access to a bad CA. Then a MITM attack can work.)
The tradeoffs between OTP and U2F are clearly listed in [13] and [8].
How LastPass decrypts your vault
Notes here are from [9], [10], [11], [12], and from my own experience setting up the phishing site.
If you want to check to know the specific requests that are important during log-in, I have highlighted them:
- login.php: the username and master password
- getaccts.php: the encrypted vault
Proxy history of a LastPass log-in and vault decryption
Getting the master password
Whenever you try to log-in, the username and password are used to derive the key used to decrypt the vault, and then plaintext password is erased.
It is nice to confirm that LastPass never sends the password to the server. For authentication, it sends a hash of the derived key.
If the master password is never sent over the wire, how does our MITM proxy get the master password? Answer: We inject some javascript in our login page to first copy the password field to another hidden field before the login logic starts.
When we inspect the traffic, we are looking for the _password
form field which has the plaintext master password.
Deriving the AES keys
We use the username and password to derive the key used to encrypt and decrypt the Vault. (source)
Here, we hash password
with the salt username
with 100100
iterations. Having a lot of iterations make it harder to brute force the password.
Getting the authentication hash
You hash the AES key one more time to get the authentication hash (source)
This is the hash that is sent along with the username and 2FA OTP in the /login.php
request to authenticate.
Decrypting the chunks of the vault
Once authenticated, LastPass will try to download the vault. We intercept the encrypted vault in the /getaccts.php
request. We process the vault by:
- decoding into bytes and divided into several chunks (one chunk is)
- each chunk can then be decomposed into the individual fields (source)
If we display the individual fields, it would look something like this.
Notice here that each field is encrypted. We use the key we derived from the username and password using AES-CBC. The first bytes of each field is the initialization vector.
Plaintext URLs
One notable thing here is that the URL field is not encrypted, which was pointed out by [12], and can be seen in the python code [11].
I don't know why LastPass decided to keep the URLs in plaintext.
It might be a stretch but one guess is for the efficiency of the application. If the URLs, in plaintext, then I can search through the ciphertexts and only decrypt the account chunks I need. But does that really take that much time? You can always decrypt only the URLs first whenever you open the vault.
Another use case is to get some analytics of the sites that LastPass is stored. This would help them prioritize which sites to check whether or not password reset, autofill, and equivalent domains work? They can get an idea
When asked about this by [12], LastPass responds:
LastPass encrypts your Vault before it goes to the server using 256-bit AES encryption. Since the Vault is already encrypted before it leaves your computer and reaches the LastPass server, not even LastPass employees can see your sensitive data.
Key Takeaways
Here is what we can learn from this:
- the master password is never sent to the server.
- credentials are encrypted before they are sent to the server
- decrypted is done on the client (desktop app or your browser)
- the URL is sent and stored in plaintext
If LastPass was breached by just like what happened in 2015 [23]then the hackers would have:
- username
- a hash of the master password and encryption keys
- encrypted vault
- All plaintext URLs that your account is associated with
Is there any risk to the users if a breach occurs? If you ask LastPass themselves then they would say no because the vault is encrypted and you shouldn't be able to reverse the hash to get the decryption keys.
'We are confident that our encryption measures are sufficient to protect the vast majority of users.' — LastPass [23]
Lastpass Fido2
This may be an unsatisfactory answer for you, and you might not really like the idea of someone else storing all your passwords, even if they are encrypted. If so, then you are probably using a self-hosted password manager.
Also, all these encryption breaks if you can just grab the passwords during a MITM phishing attack!
Lastpass and U2F
To be clear, LastPass only supports OTP [21].
Works with Yubikey: LastPass [21]
Why did I mistakenly think that LastPass supports U2F?
I think it boils down to naively associating YubiKey to security keys. But as I have learned, just because I'm using a YubiKey, doesn't mean it's U2F.
It doesn't help that there were pages like this.
The diagram suggests that using Yubikeys with Lastpass makes you less 'phishable' and more secure, which is only true when using U2F.
If we update the page to be more accurate we should have something like.
'Corrected' diagram
Distinguishing between U2F and Yubico OTP makes it clear that the OTP is phishable. This is something we just demonstrated.
Here is another page which misled me:
Immune to MITM? What am I missing?
Technically, this is true when using U2F. But considering that LastPass doesn't support security keys, I think that statement is misplaced.
I guess I'm not alone. Here are some articles that might have gotten it wrong: [17], [19], and [20].
In the article below, it didn't mention explicitly that LastPass supports U2F, but the association is.
'If there's one area where you'd expect U2F technology to be encouraged, it's among password managers.' [17]
So when will LastPass support U2F? If we look at the comments sections in this announcement, we see people clarify this and constantly asking for support of U2F.
Sadly, we have posts as far back as 2014 asking for this, and it is not clear if Lastpass ever plans to support U2F. There are still posts as recent as May 2020.
As for me, I felt really stupid paying for a premium account without double-checking what exactly I am paying for. Also, there are no refunds.
Note to self, simply looking at a table like this is misleading.
The 'Hardware Token' can refer to both OTP and U2F. You have to took specifically whether or not it is U2F (or protocols).
Moving out of LastPass
Less than 24 hours of paying for a LastPass premium account, I'm moving out.
Given the current lack of U2F support, the lack of concrete plans to support U2F, and the sketchy plaintext URLs , I'm done with LastPass. I don't know why I have stayed with it for so long.
Now that I really think about it, my ideal password manager should have the following properties:
- supports U2F for multifactor authentication to prevent phishing
- open-sourced and 3rd-part audited [22]
- Is self-hosted on my own servers
I'm currently looking into Bitwarden. Maybe self-hosted. If you have suggestions or comments on what password manager to use, I'd appreciate it.
Additional Resources:
Here are some tips on how to secure your workforce during the lockdown from Raymond Nunez.
For a deeper dive into implementing your own phishing campaign, checkout blogpost for Evilginx2 or the repository itself.
Here is another blog that talks about how to phish Lastpass users as well. The approach is somewhat similar. Their approach differs slightly since they steal the credentials in the vault as they are decrypted by the victim's browser. This generates a lot of additional requests, making it more likely to be detected.
The approach in this blog grabs the username, password, and the encrypted vault, which are queried legitimately in a typical session with Lastpass, and this is decrypted offline.
For a pedestrian overview of U2F, you can watch this introduction by Jen Tong [5].
Of course, this blog post can be irrelevant if LastPass suddenly comes out with an update to support U2F. That should be nearby since its been on their radar for so long and that Firefox and Chrome support it
References
[1] Google Transparency Report
[2] PCMag, 'Phishing Attacks Increase 350 Percent Amid COVID-19 Quarantine (2020)'
[3] Krebs on Security, 'Google: Security Keys Neutralized Employee Phishing (2018)'
[4] Versprite, Utilizing Reverse Proxies to Inject Malicious Code & Extract Sensitive Information.
[5] Jen Tong, Security Keys are Awesome.
[6] https://github.com/kgretzky/evilginx2
[7] Yubico, FIDO U2F.
[8] DUO, What's the difference between the YubiKey OTP and Security Key functionalities?
[9] Versprite, Attacking LastPass: Compromising an Entire Password Database
[10] Lastpass Technical Whitepaper
[11] https://github.com/konomae/lastpass-python/
[12] PSA: LastPass Does Not Encrypt Everything In Your Vault
[13] OTP vs. U2F: Strong To Stronger
[14] Lastpass Help, Use YubiKey Multifactor Authentication
[15] Kerbs on Security, Phishers Are Upping Their Game. So Should You.
Lastpass For Android Phone
[16] Yubico, OTPs Explain
Yubikey Not Working With Lastpass
[17] John Leyden, PortSwigger The Daily Swig, U2F nowhere near ready for prime time
[18] Troy Hunt, Beyond Passwords: 2FA, U2F and Google Advanced Protection
[19] Josie Colt, Wired, Simplify and Secure Your Online Logins With a YubiKey
[20] ZDNet, Best security keys in 2020
[21] Yubico, LastPass Premium and Families
[22] Bitwarden Completes Third-party Security Audit
[23] LastPass Hacked — Identified Early & Resolved
Photo by Ethan Sexton on Unsplash