Close Menu
    2digital.news2digital.news
    • News
    • Analytics
    • Interviews
    • About us
    • Editorial board
    • Events
    2digital.news2digital.news
    Home»News»LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine
    News

    LastPass Still Paying for Its 2022 Mistake as UK Imposes £1.2 Million Fine

    Mikolaj LaszkiewiczBy Mikolaj LaszkiewiczDecember 12, 20252 Mins Read
    LinkedIn Twitter Threads Reddit
    Share
    Twitter LinkedIn Threads Reddit

    In 2022, LastPass allegedly committed a series of security failures that led to a massive leak of user data. According to CyberInsider, attackers gained access to the company’s development environment and then to user information stored inside encrypted vaults. The UK’s Information Commissioner’s Office (ICO) concluded that the company had not implemented adequate protections — particularly in access control, environment segmentation, and monitoring mechanisms capable of detecting early signs of intrusion.

    The report states that the breach affected roughly 1.6 million users in the United Kingdom alone — including email addresses, account metadata, and other information that, while encrypted or partially protected, could still increase the risk of future targeted cyberattacks.

    The UK regulator found LastPass’s remediation efforts insufficient and too slow, noting that the company failed to quickly implement mechanisms to mitigate the impact of the breach. The ICO concluded that LastPass violated fundamental information security principles, resulting in the financial penalty.

    LastPass had already faced criticism for how it communicated about the incident — according to CyberInsider, the company released information slowly and in stages, making it difficult for users to assess the severity of the threat. Regulators reportedly cited this as a factor that worsened the assessment of the situation.

    Fortunately, no user passwords were exposed in plaintext. Passwords and private notes were encrypted using each user’s master password, which LastPass never stored — consistent with its zero-knowledge model. User passwords were not decrypted during the attack, but they were stolen in encrypted form, and their safety depends entirely on the strength of the master password. If that password was weak or leaked elsewhere, some users could face long-term brute-force risks (attackers trying millions of combinations until one succeeds).

    Related Posts

    News

    75% of Google’s new code is created by AI. The company announces a new era of programming.

    April 23, 2026
    News

    Revolution in the clinic? OpenAI releases free medical ChatGPT for doctors

    April 23, 2026
    News

    US wants to spend more on drones than the defense budgets of entire nations

    April 22, 2026
    Read more

    Why Haven’t Surgical Robots Taken Over Operating Rooms Yet?

    April 16, 2026

    From AI Picking to Robots by Subscription: How Industrial Robotics Is Changing

    April 15, 2026

    Sex toys got an upgrade. The kitchen didn’t. Maria Kardakova wants to fix that

    April 10, 2026
    Demo
    X (Twitter) Instagram Threads LinkedIn Reddit
    • NEWS
    • ANALYTICS
    • INTERVIEWS
    • ABOUT US
    • EDITORIAL BOARD
    • EVENTS
    • CONTACT US
    • ©2026 2Digital. All rights reserved.
    • Privacy policy.

    Type above and press Enter to search. Press Esc to cancel.