Close Menu
    2digital.news2digital.news
    • News
    • Analytics
    • Interviews
    • About us
    • Editorial board
    • Events
    2digital.news2digital.news
    Home»News»LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine
    News

    LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine

    Mikolaj LaszkiewiczBy Mikolaj LaszkiewiczDecember 12, 20252 Mins Read
    LinkedIn Twitter Threads

    In 2022, LastPass allegedly committed a series of security failures that led to a massive leak of user data. According to CyberInsider, attackers gained access to the company’s development environment and then to user information stored inside encrypted vaults. The UK’s Information Commissioner’s Office (ICO) concluded that the company had not implemented adequate protections — particularly in access control, environment segmentation, and monitoring mechanisms capable of detecting early signs of intrusion.

    The report states that the breach affected roughly 1.6 million users in the United Kingdom alone — including email addresses, account metadata, and other information that, while encrypted or partially protected, could still increase the risk of future targeted cyberattacks.

    The UK regulator found LastPass’s remediation efforts insufficient and too slow, noting that the company failed to quickly implement mechanisms to mitigate the impact of the breach. The ICO concluded that LastPass violated fundamental information security principles, resulting in the financial penalty.

    LastPass had already faced criticism for how it communicated about the incident — according to CyberInsider, the company released information slowly and in stages, making it difficult for users to assess the severity of the threat. Regulators reportedly cited this as a factor that worsened the assessment of the situation.

    Fortunately, no user passwords were exposed in plaintext. Passwords and private notes were encrypted using each user’s master password, which LastPass never stored — consistent with its zero-knowledge model. User passwords were not decrypted during the attack, but they were stolen in encrypted form, and their safety depends entirely on the strength of the master password. If that password was weak or leaked elsewhere, some users could face long-term brute-force risks (attackers trying millions of combinations until one succeeds).

    Share. Twitter LinkedIn Threads

    Related Posts

    News

    New iron-based nanomaterial eliminates tumors in preclinical models

    March 3, 2026
    News

    Drone strikes hit Amazon data centers in the UAE and Bahrain – AWS services face major disruptions

    March 3, 2026
    News

    Qualcomm unveils Wi-Fi 8 with record speeds and built-in AI support

    March 2, 2026
    Read more

    When the genetic layer of the body ages — and what science is trying to do about it

    February 24, 2026

    Will We All Become Cyborgs?

    February 20, 2026

    AI-predicted insulin resistance as a potential cancer risk factor. Data from 370 thousand people

    February 19, 2026
    Stay in touch
    • Twitter
    • Instagram
    • LinkedIn
    • Threads
    Demo
    X (Twitter) Instagram Threads LinkedIn
    • NEWS
    • ANALYTICS
    • INTERVIEWS
    • ABOUT US
    • EDITORIAL BOARD
    • EVENTS
    • CONTACT US
    • ©2026 2Digital. All rights reserved.
    • Privacy policy.

    Type above and press Enter to search. Press Esc to cancel.