UPDATE
As of January 9, the security community consensus is that LastPass may be downplaying the potential risk of this exposure. Because of this, the UISO recommends transitioning to a different passphrase manager to replace LastPass.
As of January 9, the security community consensus is that LastPass may be downplaying the potential risk of this exposure. Because of this, the UISO recommends transitioning to a different passphrase manager to replace LastPass.
On December 22nd, the popular password manager LastPass announced that they had a serious data breach. In August 2022, an unauthorized third party gained access to a cloud-based storage service containing archived backups of production data, including an unknown number of passphrase vaults. Although the passphrases in the vaults are encrypted, threat actors can brute force vaults they downloaded, even after you change your master passphrase.
LastPass has shared that the threat actor copied information from a backup that contained encrypted copies of user passphrase vaults. The breach also includes basic customer account information, including names, email addresses, phone numbers, and some billing information. LastPass says that credit card information is not archived in this cloud storage environment.
If you use LastPass to store passwords, or other critical information, they may be exposed. Please take the following steps to keep your data safe: