Update: On December 22, LastPass published a new blog post with further information about leaked customer information, saying that account information such as billing addresses, email addresses, end-user names, telephone numbers, and IP address info were obtained. Also leaked was customer vault data, which includes unencrypted data such as website URLs and encrypted data such as website usernames and passwords, secure notes, and form-filled data.
You can read more about the information lost in the company’s blog post, as well as its full explanation of what’s happened so far and the steps the company is taking next. If you’re a LastPass customer, your best protection is to use a strong random password that’s never been used elsewhere. You can also choose to switch providers—our round-up of the best password managers has suggestions beyond LastPass that you can try.
The original story from Dec 1, which covers more background details of the leak, follows below.
It’s been a rough year for LastPass. Back in August, the popular password manager suffered a security breach, in which the company’s developer environment was infiltrated. At the time, LastPass said that while part of its source code and proprietary technical info were taken, customers were unaffected.
Now the company has experienced a second related hack, this time impacting customers. As reported Wednesday on its blog, LastPass recently detected unusual activity within a third-party cloud storage service. An investigation has so far revealed that the breach stemmed from knowledge gained during the August 2022 incident, and that “certain elements of customers’ information” have been accessed. Further information is unavailable, as the investigation is still ongoing. LastPass says that customer passwords remain safely encrypted, however.
If you find this news unsettling despite the service earning recommendations (including ours) for its day-to-day experience, your reaction is a fair one. LastPass has suffered hacks of its service in previous years, with notable incidents including 2015’s unauthorized access of user account email addresses, password reminders, and authentication hashes. Other security lapses include 2017’s browser extension vulnerability, which allowed websites to steal passwords. In 2019, the same security researcher who discovered the 2017 issue also discovered another browser extension vulnerability that allowed the last used password to be leaked. The company has even made communication bumbles, like security alert emails sent to customers unaffected by a credential stuffing attack.
Other top-notch password managers haven’t reported nearly as many incidents over the years, and if you’re so inclined, you can make a switch to one of them pretty easily. You can also review the security on your LastPass account, making sure it falls in line with best practices, including the use of a strong password, enabling two factor authentication, and keeping a close eye on authorized devices.Â
But as discomforting as this transparency may be, the underlying issue isn’t the general concept of a password manager. They remain a vital part of online security, and you can find ways of making them more comfortable to use, even in the face of security breaches. Don’t abandon them outright.