LastPass Breach 2022: When the Password Manager Gets Breached

9 minute read
August–December 2022
Share Article
BREACH INTELLIGENCE
breach date

August–December 2022

Industry

Cybersecurity

Severity

Critical

Records Exposed

30M+ vaults

Financial Impact

Ongoing exposure

Breach Summary

The LastPass breach of 2022 is the most instructive data breach in the password security space precisely because it happened to the company that was supposed to be the answer to password security. LastPass stores the master passwords and encrypted password vaults of over 30 million users and 85,000 businesses. When attackers breached LastPass twice in 2022 — once in August, and again in November using data from the first breach — they obtained copies of customer password vaults that, if cracked, would give complete access to every password those customers had ever stored.

The LastPass breach is still unfolding. Cracking efforts against stolen vaults are ongoing. Users who reused their LastPass master password, chose a weak master password, or had weaker encryption parameters due to using LastPass under older settings remain at risk from their 2022 vault copy being cracked years after the breach.

What Happened

What Happened

The August 2022 intrusion gave attackers source code, technical documentation, and internal technical details about LastPass's cloud architecture. LastPass disclosed this breach but assessed that no customer data had been accessed. The November 2022 intrusion used the technical intelligence from August to target LastPass's cloud backup environment through a compromised senior DevOps engineer. The engineer's home computer — running Plex Media Server on an outdated, vulnerable version — was compromised using a known Plex vulnerability. A keylogger captured the engineer's corporate credentials, including the decryption key for the corporate vault and access to the AWS S3 backup environment where customer data was stored. The attackers exfiltrated a significant volume of customer data, including encrypted vault backups, customer account metadata, and billing information. LastPass disclosed the full scope of the breach in December 2022 and January 2023. The disclosure acknowledged that the stolen vault data, while encrypted, could be subject to brute force cracking attempts — with success dependent on master password strength and the encryption parameters used at the time each vault was created.

Attack Vector Detail

The Attack Vector: Developer Endpoint to Cloud Backup

The LastPass breach involved two distinct but connected intrusions. The August 2022 intrusion compromised a LastPass developer's endpoint — through means not fully publicly disclosed but consistent with credential theft or malware — and used that access to steal source code and technical documentation from LastPass's development environment. LastPass initially characterized this as a contained incident with no customer data exposed.

The November 2022 intrusion used data obtained from the August breach — specifically, technical information about LastPass's cloud backup infrastructure — to target a senior DevOps engineer's home computer. The attackers compromised the DevOps engineer's personal machine, exploiting a vulnerable media software installation (Plex Media Server running an outdated version) to deploy a keylogger. The keylogger captured the engineer's master password for the LastPass corporate vault, which provided access to LastPass's cloud backup environment. The attackers exfiltrated customer data including encrypted vault backups, customer names and email addresses, billing information, and metadata about the vaults themselves.

Breach Pattern Timeline

August 2022

LastPass discloses initial breach: attackers accessed a portion of LastPass development environment via a single compromised developer account. LastPass states no customer data or vaults were accessed.

November 30, 2022

LastPass discloses second breach: attackers used information stolen in the August breach to access a third-party cloud storage service shared by LastPass and parent company GoTo (formerly LogMeIn).

December 22, 2022

LastPass updates disclosure: attackers stole encrypted customer vaults including website URLs (unencrypted), usernames, billing addresses, and the encrypted password vault data itself.

January 2023

Attribution surfaces: attackers had compromised a senior DevOps engineer's home computer via vulnerable Plex Media Server installation, then captured the engineer's master password from a keylogger and used it to decrypt corporate vault credentials providing access to AWS S3 backup buckets.

February 2023

LastPass discloses additional details about the breach scope. Affected customers begin filing class action lawsuits citing inadequate security practices and disclosure delays.

2023

Cryptocurrency theft attributed to LastPass-leaked vaults begins surfacing. Researchers track $35M+ in cryptocurrency stolen from victims whose seed phrases were stored in LastPass vaults exposed in the breach.

2024-2025

Cryptocurrency theft attribution to LastPass continues climbing. Tracked figures exceed $200M in cryptocurrency stolen via post-breach vault decryption. ZachXBT and other investigators document patterns of LastPass victims being targeted.

2025-2026

Class action consolidation continues in U.S. federal courts. LastPass remains operational but with significantly damaged trust. Password manager industry shifts toward zero-knowledge architectures with hardware-bound master keys.

Total impact: 30 million LastPass users affected, $200M+ in cryptocurrency stolen via decrypted vaults, foundational precedent for password manager threat modeling and the limits of the 'we can't see your data' security narrative when implementation has gaps.

Executive Lessons

LastPass established that a developer's compromised personal device can provide the initial access necessary to eventually reach crown-jewel data in a cloud storage environment. The breach also demonstrated that encrypted vault data, even without the master password, represents a long-duration liability: vaults encrypted with weak master passwords can be cracked, and any secrets stored in LastPass should be considered compromised and rotated. For organizations that deployed LastPass as an enterprise password manager, all service account credentials and privileged access credentials stored in LastPass should have been rotated following the 2022 disclosure.

Related Reading

Private Equity Implications

Private Equity Implications

PE firms and portfolio companies that used LastPass Business accounts during the 2022 breach period have a specific ongoing risk: their password vaults may be among those exfiltrated, and if those vaults contain credentials to critical financial systems, portfolio company environments, or firm infrastructure, cracking of those vaults would provide direct access. Organizations that have not rotated all credentials stored in LastPass since the 2022 breach should treat that rotation as an urgent security hygiene requirement. The ongoing nature of the vault cracking risk — years, not months — makes this a sustained rather than historical exposure.

How Cloudskope Can Help

Cloudskope's Identity and Access Risk Assessment includes evaluation of enterprise password manager deployment and policy — ensuring that corporate credentials are stored with appropriate encryption parameters, that master password policies enforce genuine strength, and that enterprise password vault access is monitored for anomalous activity. If your organization used LastPass during the 2022 breach period, our assessment includes evaluation of exposure risk and recommended remediation steps.

Frequently Asked Questions