Sky-Knight
Well-Known Member
- Reaction score
- 5,621
- Location
- Arizona
Buying? I don't think you understand how botnets work sir...Depends if the salts were taken as well. They also need to know the exact number of rounds used. LP says they use 100,100 but I would bet that each vault has a random slight variation on that 100,083 for one 100,113 for next and so on.
Online services are expensive. Buying out 20 or so VM to crack a blob is going to cost $1000 per day. Can't see hackers doing that. Using crypto mining has hardware upfront costs and electric costs. If encrypted blobs were that easy to crack there be no point.
And yes, the salts are important too. But that's the problem with the Lastpass breach, the attackers infiltrated via a dev account. Which dev account? And how much of their codebase were they able to access?
We have to assume the vaults were taken, the algorithms to generate the keys was lifted, and now all they have to do is keep the vaults offline for years while they work away at unlocking them. They'll never break the 256bit AES, but they very much will break the single factor password and generate the required keys, then the entire vault is there.
Between now and then, change all the passwords in the vault. Because while it's still probably at least a decade out for any serious user, it's still a risk to be mitigated. Not something to get into a mad panic over, but a risk to be mitigated.
@britechguy I don't have belief in this, I have certified experience with modern authentication systems and defending them. You however, do not. And it shows. There is no such thing as a secure password that can be easily typed. And in the case of password vaults, do to their access nature they must use passwords that are relatively easily typed. MFA helps only the online access, it does nothing for the actual decryption process, this is a problem.