What You Need to Know about the LastPass Data Breach

  • Published: Dec 18, 2025
  • Last Updated: Dec 18, 2025

LastPass prides itself on being a pioneer in cloud security technology, providing password and identity management solutions for personal and business digital safety. Its over 800 employees and over 20 million customers worldwide have made the company an attractive target for cybercriminals.

The company has been in the headlines for several data incidents over the past few years. These breaches have served as a wake-up call to individuals looking to secure passwords and keep sensitive information, considering that the mainstay among password manager tools is being hacked.

Sometime in 2022, LastPass confirmed a security incident in which an unauthorized party accessed some of its customer data through a third-party cloud storage service. The breach was in two stages. In the first stage, the hacker is believed to have gained access to a corporate laptop owned by one of LastPass’s employees and was able to access the firm’s development environment. However, the hacker could not exfiltrate personal information but managed to steal the company’s encrypted credentials.

After stealing encrypted company credentials, the hacker targeted a senior employee who had access to the decryption key. The attack happened through the employee’s personal device, leveraging the vulnerability in a third-party streaming service to retrieve the employee’s company credentials. Upon obtaining the LastPass employee’s master password, the hacker accessed the employee’s personal and business LastPass vaults, which contained the AWS access key and decryption key.

Following this, the cybercriminal was able to extract the contents of the backup database, which held the personal information of about 1.6 million people, including names, phone numbers, emails, usernames, passwords, and stored website URLs. The 2022 LastPass data breach remains a turning point in 2025, as news continues to emerge on the incident.

The U.K. Fines LastPass

The 2022 LastPass data incident has now come back to haunt the business, as the United Kingdom Information Commissioner’s Office (ICO) recently fined the company £1.2 million ($1.6 million). This fine covers the breach that impacted 1.6 million U.K. users only. There is no substantial evidence that the threat actors were able to decrypt customer passwords. However, the ICO believes that LastPass failed to implement adequate security and technical measures, which enabled the hacker’s unauthorized access to the company’s backup database.

When Was the LastPass Data Breach?

On August 25, 2022, LastPass published a notice informing users and the public that it detected suspicious and unusual activity inside the company’s development environment through a single compromised developer account. The company immediately engaged a cybersecurity firm to investigate the security incident. On September 15, 2022, LastPass confirmed that the findings revealed the hacker only accessed the company’s development environment for about four days and that no evidence of customer information or password compromise was found.

Again, on November 30, 2022, LastPass announced that an unauthorized party, through information stolen during the August incident, accessed the company’s third-party cloud storage service. As a result, certain elements of customers’ information were compromised, but the company insisted passwords remained safely encrypted.

By December 22, 2022, LastPass stated it detected an unusual activity in a third-party cloud-based storage environment. While inside the storage environment, the hacker compromised basic LastPass customer account details and a backup of customer vault data, which included unencrypted data. However, the company noted that without the master passwords, the threat actor did not have the means to open them.

The company announced additional critical developments on March 1, 2023. It revealed that the threat actor targeted its DevOps engineer’s home computer by exploiting a vulnerable third-party media software package. Once inside the computer, the hacker implanted keylogger malware and was able to capture the DevOps engineer’s password as it was entered. Following this, the threat actor gained access to the employee’s corporate vault and accessed a wide range of sensitive customer data. 

How to Check If Your Data Was Breached

LastPass continues to share updates on the breach through its website. If you use LastPass as your password security manager and believe your data may have been compromised, consider checking the site regularly for new developments regarding the incident. Additionally, you can check if your passwords were breached in the incident by searching breach-check websites, such as Have I Been Pwned. The FBI recently handed over stolen credentials to Have I Been Pwned, suspected to be linked to the 2022 LastPass hack.

Furthermore, if you notice unusual logins on your online accounts, especially if you use LastPass passwords across other accounts, your details may have been exposed by the breach. Similarly, getting a password reset email for a request you did not initiate suggests that your password and other details may have been compromised during the incident. 

What to Do If Your Data Was Breached

If the breach exposed your password, change your master password immediately. LastPass requires using a 12-character minimum for master passwords to reduce the risk of brute-force password guessing. Moreover, avoid reusing the password on other websites, because if it ever gets compromised, hackers may use it to attempt to access your account. Checking LastPass’s guide on changing your password iterations may help.

Your email is the key to password resets. Consider locking it down with a strong password, two-factor authentication, and recovery options you control if you were affected in the LastPass data breach. Furthermore, it is best to keep your devices updated, as many attacks rely on known vulnerabilities that software updates already fix.

You should also consider checking your bank and credit card statements regularly for any suspicious activity. In addition, you can place a fraud alert or credit freeze on your credit reports to prevent unauthorized new accounts from being opened in your name.

Are There Any Lawsuits Because of the Data Breach?

Yes, multiple lawsuits alleging deceptive practices, negligence, and failure to protect customer data have been filed against LastPass over the 2022 data incident. These include the following:

  • Consolidated United States Action - The consolidated action is In re LastPass Data Security Incident Litigation, Case No. 1:22-cv-12047, in the U.S. District Court for the District of Massachusetts. It includes nine lawsuits initiated to hold LastPass accountable for breach of contract, the California Consumer Privacy Act, the California Consumer Records Act, the Illinois Consumer Fraud and Deceptive Business Practices Act, and the Illinois Personal Information Protection Act.

In July 2024, the plaintiffs defeated a motion that allowed their case to move forward in the breach litigation. By November 2025, there were reports of a potential class-wide agreement being reached to settle the consolidated class action.

  • John Doe v. LastPass USS LP - This case was filed by an anonymous plaintiff, John Doe, with the U.S. District Court of Massachusetts. Marked Case No. 1:23-cv-10004-PBS and filed on January 3, 2023, the plaintiff, individually and on behalf of all others similarly situated, alleges that LastPass failed to secure and safeguard highly sensitive consumer data.

The lawsuit also states that the personal information of victims is no longer hidden but in the hands of cybercriminals who have fraudulently misused such information. The evidence attached to the suit reveals that in November 2022, John Doe had about $53,000 worth of Bitcoin stolen from his blockchain wallet. In his case, Doe alleges the theft was committed through the credentials he stored in his LastPass vault.




 

Can My LastPass Information Be Used for Identity Theft?

Yes, your LastPass information, if stolen during the breach, can potentially be used for identity theft. Although the company claims that customer master passwords were not exposed, it confirmed encrypted password vaults and other personal details were compromised, creating certain risks.

Data such as IP addresses, billing addresses, and phone numbers, which were exposed, are valuable for cybercriminals looking to open fraudulent accounts or impersonate victims. Similarly, threat actors can use your compromised name and email address to create convincing phishing emails to trick you into disclosing your master password and other confidential data.

Furthermore, if you reuse your LastPass master password on other online accounts, including banking platforms, cyber actors may employ automated tools to try out the password on other websites where you have accounts. There have also been several reports of LastPass customers whose cryptocurrency wallets were allegedly hit following the 2022 data incident.

What Can You Do to Protect Yourself Online?

Here are a few things you can do to protect yourself online amid escalating data breaches across various industries:

  • Be cautious of unsolicited communications that appear to be from legitimate companies or organizations demanding personal information or creating a sense of urgency. Avoid opening links or attachments in text messages or emails that seem suspicious.
  • Reduce your exposed personal data and keep sensitive personal information personal. Avoid oversharing data, especially on social media accounts, to prevent or reduce the risk of scammers guessing your online credentials for malicious purposes.
  • Promptly install available updates on your internet devices.
  • Keep abreast of online scams by constantly educating yourself through sites like IDStrong.
  • Create passwords that cannot be easily guessed by anyone by using a combination of special characters, lower- and upper-case letters, and numbers.
  • Enable multi-factor authentication on your internet devices and online accounts, where allowed.
  • If someone has already misused your leaked data, report it to the Federal Trade Commission (FTC).
  • Monitor your personal information or financial data by enrolling in an identity protection service.
  • Avoid sending confidential data over a free public Wi-Fi.

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the 700Credit Data Breach

What You Need to Know about the 700Credit Data Breach

700Credit is the major provider of credit reports, fraud detection, identity verification, soft pull credit data, and compliance solutions in powersports, marine dealerships, and automotive in the United States.

What You Need to Know about the LastPass Data Breach

What You Need to Know about the LastPass Data Breach

LastPass prides itself on being a pioneer in cloud security technology, providing password and identity management solutions for personal and business digital safety.

What You Need to Know about the Coupang Data Breach

What You Need to Know about the Coupang Data Breach

Coupang, a company listed on the NYSE, is South Korea's largest online retailer and is headquartered in  Seattle. It serves millions of customers in over 190 countries, including the United States, offering retail, video streaming, restaurant delivery, and fintech services worldwide under various brands.  

What You Need to Know about the Harvard University Data Breach

What You Need to Know about the Harvard University Data Breach

Harvard University is the oldest college in the American colonies and one of the most prestigious universities in the United States.

What You Need to Know about the DoorDash Data Breach

What You Need to Know about the DoorDash Data Breach

Food delivery giant DoorDash recently suffered a cybersecurity incident that compromised sensitive customer and merchant information.

What You Need to Know about the Gmail Data Breach

What You Need to Know about the Gmail Data Breach

As the foremost email storage and communications platform, Gmail's free web-based services have penetrated every market and niche.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close