It's March 2023 and LastPass has just now sent out a
Security Bulletin suggesting how users might better secure their accounts. This regards the second breach on October 26, 2022, in which employee credentials stolen in August were used to access customer vaults, unencrypted URLs, and a host of proprietary data.
In part, the bulletin states that in January 2023, the Open Web Application Security Project (OWASP) increased its recommended number of Password Based Key Derivation Function (PBKDF2) iterations from 100,100 to 600,000. Even though LastPass offered users the maximum 100,100 iterations and recommended users set their password settings to that value, the default LastPass setting was only 5,000 iterations! LastPass now uses 600,000 iterations as the default: but it's too little, too late! LastPass should have
always used the maximum value as default, not some pathetically low number and leave it to users to increase security.
In fact, this is probably the first time LastPass has ever rapidly increased security in response to recommendations by the online security community. After experiencing at least 8 breaches in the last decade, you'd think LastPass would already have strong security protocols. They don't. LastPass should have detected and stopped the intrusion in August in real time, while it was happening. They didn't. In fact, they didn't even notice it had happened until after the October event. Whatever security measures users had in late October is what hackers have to break.
Dashlane, on the other hand, has
never been breached, and they are proactively working on passkeys to eliminate the need for usernames and passwords. Hopefully
@Dannydet the era of usernames and passwords will end in the next year or two.