LastPass security breach leaked encrypted customer password vaults
One of the best password managers details the recent LastPass data breach.
What you need to know
- Password management software LastPass suffered a breach to its cloud servers in August 2022.
- Customer data, including password vaults, names, IP and billing addresses, and phone numbers, are among the data recently confirmed stolen during the attack.
- LastPass explains its 256-bit AES encryption makes it unlikely for attackers to gain access to stolen customer password vaults.
- Credit card information was not included in the stolen data, stored separately in a safe location.
LastPass, the password management software designed for web browsers on desktop computers and mobile devices, confirmed the details of an authorized breach to its cloud storage servers and the encrypted data of digital customer vaults. In August 2022, LastPass announced that they had not accessed any customer data but that a thief had stolen the company's source code and other sensitive employee information.
In a new blog post, LastPass reveals more information about the breach to promote its commitment to transparency. The actions of a single threat actor allowed them to hijack credentials and target other employees within the company, gaining access to decryption keys for the storage devices on the backup cloud storage network. Customer data in these backups include company and end-user names, billing and email addresses, phone numbers, and IP addresses.
Digital vaults store any and all passwords saved to the service, but LastPass maintains that there is no evidence of a significant threat to customer data. All data stored on the primary and backup servers use 256-bit AES encryption that users can only access with a unique key generated by their master password. LastPass never stores these master passwords anywhere, as per its zero-knowledge architecture.
Am I affected by the LastPass breach?
LastPass maintains that it doesn't store any complete credit card numbers and that information is stored separately from the affected backup servers. The hacker responsible may attempt to gain access to the hijacked data through brute force, but the encryption method makes the probability of success extremely unlikely.
If customers have followed best practices for their master password, including using alphanumerical strings with varying cases and special characters, it would potentially take millions of years to crack the code. You should take careful action if you're in doubt about any risks to your private information, so changing your passwords is still recommended.
What happens next?
To eliminate the risk of this kind of breach happening again, LastPass has completely rebuilt its development environment and implemented strict processes and authentication mechanisms. Behind the scenes, the company is striving to identify any suspicious activity within the cloud backup storage. They are also updating their safeguards and confirming exactly which data the breach accessed, including advising business customers on recommended action.
Out of caution, law enforcement officials have been notified, and other relevant authorities are involved in an ongoing investigation. LastPass has said that more updates will follow, but systems will continue to perform as usual for current customers. If you haven't been contacted by the company directly, you can contact them via the official app or support website to address any concerns.
Get the Windows Central Newsletter
All the latest news, reviews, and guides for Windows and Xbox diehards.
Windows Central take
Any password breach is a cause for concern, but the comprehensive response and transparency from LastPass are somewhat relieving. 256-bit encryption should mean that any reasonably secure master password will keep customer vaults safe from attempted brute force access, but anyone affected should change their critical logins to be safe.
If this recent breach affected you enough to search for the best LastPass alternative, our colleagues within Windows Central use Enpass and Bitwarden to back up their passwords. No matter which service you choose, always strive to use lengthy and complex strings with a mix of letters, numbers, and symbols when accepted by the service.
Enpass
Store and sync passwords via iCloud, Google Drive, OneDrive, Box, Dropbox, NextCloud, WebDAV, or completely offline.
Bitwarden
Secure cloud syncing lets you access your sensitive information from anywhere on any device and access unlimited passwords, across all platforms.
Ben is a Senior Editor at Windows Central, covering everything related to technology hardware and software. He regularly goes hands-on with the latest Windows laptops, components inside custom gaming desktops, and any accessory compatible with PC and Xbox. His lifelong obsession with dismantling gadgets to see how they work led him to pursue a career in tech-centric journalism after a decade of experience in electronics retail and tech support.