UK fines LastPass £1.2 million for data breach affecting 1.6 million people

The British subsidiary of password management company LastPass was fined £1.2 million ($1.6 million) on Thursday by the United Kingdom’s privacy regulator for a data breach in 2022.

LastPass confirmed in December of that year that it had suffered two hacks, the first in August when “some source code and technical information were stolen from our development environment” from the corporate laptop of an employee based in Europe.

The data was then exploited by the attackers in a second attack on the personal laptop of a senior engineer based in the United States. The hacker obtained “credentials and keys” from the LastPass staffer “which were used to access and decrypt some storage volumes within the cloud-based storage service.”

Up to 1.6 million of the company’s British users had their personal information compromised in this incident. Issuing its fine on Thursday, the Information Commissioner’s Office (ICO), said LastPass had “failed to implement sufficiently robust technical and security measures” to protect this data.

The attacker also managed to obtain encrypted versions of sensitive data kept in the password manager, including website names and the passwords themselves, although these breaches are generally considered low-risk due to the expectation it would take an impossibly long time to brute force 256-bit AES encryption.

The ICO stressed there was “no evidence that hackers were able to unencrypt customer passwords as these are stored locally on customer devices and not by LastPass.”

Despite this, some experts fear that hackers have been cracking the passwords from stolen vaults. Independent journalist Brian Krebs reported that “a steady trickle of six-figure cryptocurrency heists” has been tied to the breach.

John Edwards, the Information Commissioner, stated: “Password managers are a safe and effective tool for businesses and the public to manage their numerous login details and we continue to encourage their use. However, as is clear from this incident, businesses offering these services should ensure that system access and use is restricted to ensure risks of attack are significantly reduced.

“LastPass customers had a right to expect the personal information they entrusted to the company would be kept safe and secure,” Edwards added. “However, the company fell short of this expectation, resulting in the proportionate fine being announced today.”

LastPass has faced ongoing fallout since the 2022 breach and was spun off into an independent entity last year under new ownership. A spokesperson did not immediately respond to a request for comment following the fine.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

Next Post

Hackers reportedly breach developer involved with Russia’s military draft database

Related Posts

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. "This hidden environment, with its lightweight
Read More

New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks

The Russian advanced persistent threat (APT) group known as COLDRIVER has been attributed to a fresh round of ClickFix-style attacks designed to deliver two new "lightweight" malware families tracked as BAITSWITCH and SIMPLEFIX. Zscaler ThreatLabz, which detected the new multi-stage ClickFix campaign earlier this month, described BAITSWITCH as a downloader that ultimately drops SIMPLEFIX, a
Read More

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client
Read More