Close Menu
    2digital.news2digital.news
    • News
    • Analytics
    • Interviews
    • About us
    • Editorial board
    2digital.news2digital.news
    Home»News»LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine
    News

    LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine

    December 12, 20252 Mins Read
    LinkedIn Twitter

    In 2022, LastPass allegedly committed a series of security failures that led to a massive leak of user data. According to CyberInsider, attackers gained access to the company’s development environment and then to user information stored inside encrypted vaults. The UK’s Information Commissioner’s Office (ICO) concluded that the company had not implemented adequate protections — particularly in access control, environment segmentation, and monitoring mechanisms capable of detecting early signs of intrusion.

    The report states that the breach affected roughly 1.6 million users in the United Kingdom alone — including email addresses, account metadata, and other information that, while encrypted or partially protected, could still increase the risk of future targeted cyberattacks.

    The UK regulator found LastPass’s remediation efforts insufficient and too slow, noting that the company failed to quickly implement mechanisms to mitigate the impact of the breach. The ICO concluded that LastPass violated fundamental information security principles, resulting in the financial penalty.

    LastPass had already faced criticism for how it communicated about the incident — according to CyberInsider, the company released information slowly and in stages, making it difficult for users to assess the severity of the threat. Regulators reportedly cited this as a factor that worsened the assessment of the situation.

    Fortunately, no user passwords were exposed in plaintext. Passwords and private notes were encrypted using each user’s master password, which LastPass never stored — consistent with its zero-knowledge model. User passwords were not decrypted during the attack, but they were stolen in encrypted form, and their safety depends entirely on the strength of the master password. If that password was weak or leaked elsewhere, some users could face long-term brute-force risks (attackers trying millions of combinations until one succeeds).

    Share. Twitter LinkedIn
    Avatar photo
    Mikolaj Laszkiewicz

    An experienced journalist and editor passionate about new technologies, computers, and scientific discoveries. He strives to bring a unique perspective to every topic. A law graduate.

    Related Posts

    News

    Global disparities in AI adoption may deepen economic inequalities, Anthropic report finds

    January 16, 2026
    News

    European Union Introduces Mandatory Monitoring of “Forever Chemicals” in Drinking Water – New Rules Now in Force

    January 15, 2026
    News

    Integration with Electronic Patient Records Is Holding Back AI Adoption – Majority of Doctors Say in RCP Survey

    January 15, 2026
    Read more

    «Not a ranking, but an X-ray»: How the IMF Measures Countries’ Readiness for AI

    January 8, 2026

    Why Employers Need Women’s Health Programs

    January 7, 2026

    Personalized medicine – how far can we go with precision medicine

    January 2, 2026
    Stay in touch
    • Twitter
    • Instagram
    • LinkedIn
    Demo
    X (Twitter) Instagram LinkedIn
    • News
    • Analytics
    • Interviews
    • About us
    • Editorial board
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.