Quantcast
Channel: Fast Company
Viewing all articles
Browse latest Browse all 4679

LastPass Users Could Be Vulnerable To A Phishing Attack, Warns A Security Expert

$
0
0

Users of password manager LastPass should beware of phishing attempts that impersonate the program's browser extension pop-ups to steal their passwords, warns security expert Sean Cassidy.

Cassidy presented a proof-of-concept demonstration this week at the ShmooCon security convention, showing how malicious websites can generate in-browser pop-ups that mimic—in some cases, down to the individual pixels—LastPass's login prompts.

"I was using LastPass, and I was on some random website, and it popped up a notification that I had been logged out, and I went to go click the notification, because it was just displayed at the top of the web page," says Cassidy, who is the CTO of security firm Praesidio. "I clicked it, and then I verified that it was actually LastPass, and then I thought, 'You know what? I can do this same thing.'"

LastPass stores login credentials for multiple websites locked behind a single master password, so users don't have to memorize or write down individual usernames and passwords. When visiting a site with credentials stored in LastPass and not logged in to the program, LastPass will generate an in-browser pop-up prompting the user to enter the LastPass password.

And since the pop-up is generated with the same kind of code used to build websites, there's nothing to prevent hackers from generating an identical-looking prompt and stealing users' LastPass passwords—potentially giving them access to each of the user's other passwords, Cassidy says.

"The problem with most defenses for phishes is you train your users to say, this is what a phishing email looks like, don't click it," he says. "But in this case, the phish is exactly the same HTML and CSS, so there's no way to tell which is real and which is fake."

Real and Fake Prompts

Cassidy says LastPass has told him they're taking steps to make such phishing attacks harder, which the company confirmed in an email to Fast Company on Thursday.

"We did work directly with Sean Cassidy, and can confirm this is a phishing attack, not a vulnerability in LastPass," a company spokeswoman wrote. "However, we've released an update that will prevent a user from being logged out by the phishing tool, thereby mitigating the risk of the phishing attack. In addition, LastPass has a built-in security alert to let you know when you've entered your master password into a non-LastPass web form."

Cassidy says he felt an obligation to make the vulnerability known, particularly since it's relatively easy to construct a phishing attack based on the issue, though he's not aware of any such attacks yet.

"Unlike a very advanced buffer overflow, or something that only a few people would know how to exploit, instead, anyone who knows HTML and CSS could exploit this, and very little coding is involved," he says.

He recommends that IT departments make sure their users are aware of the issue and urge users to always interact with LastPass by clicking on the program's icon, rather than responding to its pop-ups—just as users concerned about phishing might navigate directly to a bank's site or app rather than clicking on emailed links.

'); window.ga('send', 'event', 'User' , 'Interaction' , this.key + ':ArticleView:newsletter:fail'); window.ga('rollup.send', 'event', 'User' , 'Interaction' , this.key + ':ArticleView:newsletter:fail'); if (index === data.response.errors.length - 1 ) { var successfulSubscribes = newsletters.diff(failedSubscribes); $(successfulSubscribes).each(function(index) { $form.parent('div').prepend('
Thank you! Please check your inbox to confirm you subscription to '+ (this.charAt(0).toUpperCase() + this.slice(1)).replace('Fastcompany', 'Fast Company')+ '!
'); window.ga('send', 'event', 'User' , 'Interaction' , this + ':ArticleView:newsletter:success'); window.ga('rollup.send', 'event', 'User' , 'Interaction' , this +':ArticleView:newsletter:success'); }); } }); } else { $form.parent('div').html('
Thank you! Please check your inbox to confirm!
'); $form.parent('div').removeClass('error'); window.ga('send', 'event', 'User' , 'Interaction' , 'fastcompany:ArticleView:newsletter:success'); window.ga('rollup.send', 'event', 'User' , 'Interaction' , 'fastcompany:ArticleView:newsletter:success'); window.ga('send', 'event', 'User' , 'Interaction' , 'events:ArticleView:newsletter:success'); window.ga('rollup.send', 'event', 'User' , 'Interaction' , 'events:ArticleView:newsletter:success'); } }; function _formFail ($form, error) { if (!$form) { return; } console.warn('error: ', error); // Use message from server response var message = JSON.parse(error.responseText); if (message.response && message.response.message) { message = message.response.message; // Error message not provided } else { message = 'Please enter a valid email address.'; } var $parent = $form.parent('div'); // Remove other errors first var $errors = $parent.find('.alert-box'); if ($errors) { $errors.fadeOut(300, function() { $(this).remove(); }); } if (message && (message.code === -100)||(message.code === 220)) { message = 'Please enter a valid email address.'; } // Append new errors $form.parent('div').prepend('
' + message + '
'); $form.find('input').prop('disabled', false); }; }); })

Viewing all articles
Browse latest Browse all 4679

Trending Articles