Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    NVIDIA AI Chip Demand Continues Driving Cloud Strategy Changes at AWS, Azure, and Google Cloud

    March 1, 2026

    Google DeepMind and OpenAI Intensify Competition as Coding AI Models Target Software Developers

    March 1, 2026

    Google Expands AI-Generated Audio Tools, Signaling a Major Shift in Digital Advertising Strategy

    March 1, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      NVIDIA AI Chip Demand Continues Driving Cloud Strategy Changes at AWS, Azure, and Google Cloud

      March 1, 2026

      Google DeepMind and OpenAI Intensify Competition as Coding AI Models Target Software Developers

      March 1, 2026

      Google Expands AI-Generated Audio Tools, Signaling a Major Shift in Digital Advertising Strategy

      March 1, 2026

      Amazon Announces $12 Billion Louisiana Data Center Investment to Boost AI and Cloud Capacity

      February 27, 2026

      Hyperscalers Including Microsoft and Amazon Build Private Energy Systems to Power AI Data Centers

      February 27, 2026
    • Crypto

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026

      Kanye West YZY Coin Crash Follows $3B Hype Launch

      August 24, 2025
    • Gadgets & Smart Tech
      Featured

      Tesla Launches China AI Training Center for Full Self-Driving Development

      By preciousFebruary 18, 2026
      Recent

      Tesla Launches China AI Training Center for Full Self-Driving Development

      February 18, 2026

      Samsung to Unveil AI-powered Galaxy S26 on February 25 Unpacked Event

      February 13, 2026

      Meta Introduces its Neural Wristband to the World

      February 4, 2026
    • Cybersecurity & Online Safety

      OpenAI Benchmarks AI Models for Smart Contract Security Testing in Blockchain Applications

      February 27, 2026

      Cybersecurity Stocks Drop as Anthropic Launches Claude Code Security Tool

      February 26, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      SentinelOne Warns Hackers are Targeting AI in Physical World Systems like Self-Driving Cars

      February 18, 2026

      Deepfake Zoom Calls Used in Corporate Fraud Attacks: Inside the Latest AI Social Engineering Scheme

      February 17, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»LastPass UK Fined £1.2m by ICO After Breach Exposed 1.6m Users
    Cybersecurity & Online Safety

    LastPass UK Fined £1.2m by ICO After Breach Exposed 1.6m Users

    preciousBy preciousDecember 22, 2025Updated:January 18, 2026No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The UK’s Information Commissioner’s Office (ICO) has fined LastPass UK Ltd £1.2 million for a 2022 data breach that exposed personal details of up to 1.6 million users across the country. The recently announced penalty is as a result of the Commission’s findings of the security company’s failures in adhering to best security practices, which allowed for attackers to steal sensitive data. 

    Although core password vaults remained encrypted during the attack itself, this enforcement action by the ICO still highlights regulators’ commitment to holding credential management companies accountable for infrastructure and operational security failings, regardless of encryption strength.

    The compromised data lost to the attackers’ breach included customer names, email addresses, billing addresses, partial credit card numbers, website URLs, and the technical parameters of each user’s encryption settings.

    While the attackers did not decrypt customer password vaults during the exfiltration itself – thanks to LastPass’ “zero-knowledge” encryption architecture where master passwords remain stored locally on user devices – the stolen encrypted vault backups eventually became subject to offline brute-force attacks in the months following the initial breach. 

    LastPass suffered a Two-Incident Attack Chain

    The initial breach occurred in a two-incident attack chain that consisted of two coordinated attacks that if it had happened in isolation, it would have been insufficient for the attackers to achieve full compromise. 

    Incident 1

    The attacker first compromised a European-based employee’s corporate laptop and exfiltrated source code repositories, technical documentation, and a cryptographically protected SSE-C (Server-Side Encryption with Customer-Provided Keys) key that helped secure the backup database.

    Importantly, the attacker did not obtain the decryption key itself, only the encrypted version. However, if at this stage, LastPass’ security architecture had prevented escalation, the second incident (Incident 2) wouldn’t have succeeded. 

    Incident 2

    A day after Incident 1, the threat actor then targeted a senior-level employee, who was one of the employees who had full access to the decryption keys. The attacker exploited an unpatched critical vulnerability through a media server running on the employee’s personal device, installed a keystroke logger to capture their master password, and then bypassed multi-factor authentication using a trusted device cookie. 

    This allowed for the attacker to gain access to the employee’s LastPass account, navigating from one vault to the other to retrieve AWS credentials and the decryption key. With access to the decryption key, the threat actor exfiltrated the entire backup database containing encrypted user vaults, alongside unencrypted customer details such as names, email addresses, billing information, partial credit card numbers, associated website URLs, and even the specific encryption parameters applied to each user’s vault.

    Regulatory Findings: ICO identifies fundamental failures in LastPass’ security governance and response

    During the ICO’s investigation period, they identified three critical failures of LastPass’ system, which includes;

    1. Inadequate device security governance: LastPass allowed senior employees with privileged access to use personal devices for accessing business accounts without sufficient endpoint protection, network segmentation, or monitoring. This directly violated basic Bring Your Own Device (BYOD) guidance from the UK’s National Cyber Security Centre (NCSC).
    2. Master password architecture risk: The company permitted Personal and Employee Business accounts to be linked under a single master password, which enabled lateral movement once one account was compromised. This architectural choice conflated authentication contexts and eliminated compartmentalization as a defensive boundary.
    3. Incident response failures: Detection mechanisms further failed as AWS GuardDuty alerts triggered on October 15 and 22 went unnoticed due to misconfigured notification lists and internal communication breakdowns, leaving the security operations center in the dark until early November in 2022. This lack of adequate operational oversight directly contravened UK GDPR Articles 5(1)(f) on data integrity and confidentiality alongside Article 32(1) that mandates appropriate technical and organizational measures.

    It is important to note that the ICO found no evidence that encrypted passwords and vault credentials were decrypted by the attacker during the active breach phase. However, the £1.2 million fine was issued on LastPass’s failure to implement appropriate technical and organizational security measures as predicated by regulatory bodies. 

    Since the breach in 2022, LastPass has implemented significant security enhancements post-breach, including prohibition of linked Personal/Employee Business accounts in May 2023, mandatory number matching for multi-factor authentication, enhanced logging and alerting, and deployment of additional security platforms such as CrowdStrike for endpoint protection, CyberArk for privileged access management, Zscaler for cloud security, Qualys for vulnerability management, and GitGuardian for secrets scanning.

    AWS GuardDuty alerts BYOD security governance Credential management security ICO fine £1.2 million Information Commissioner's Office (ICO) LastPass 1.6 LastPass 1.6 million users affected LastPass data breach LastPass UK Ltd Master password architecture risk MFA Bypass MFA bypass phishing Password manager infrastructure failures Two-Incident attack chain UK GDPR Unpatched media server vulnerability ZEro-knowledge encryption
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    OpenAI Benchmarks AI Models for Smart Contract Security Testing in Blockchain Applications

    February 27, 2026

    Cybersecurity Stocks Drop as Anthropic Launches Claude Code Security Tool

    February 26, 2026

    AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

    February 18, 2026

    Comments are closed.

    Top Posts

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    Coinbase Hack 2025: Everything we know so far.

    May 21, 2025
    Don't Miss
    Big Tech & Startups

    NVIDIA AI Chip Demand Continues Driving Cloud Strategy Changes at AWS, Azure, and Google Cloud

    By fariehanMarch 1, 2026

    Nvidia is now in control of roughly 80% of the AI data center chip market…

    Google DeepMind and OpenAI Intensify Competition as Coding AI Models Target Software Developers

    March 1, 2026

    Google Expands AI-Generated Audio Tools, Signaling a Major Shift in Digital Advertising Strategy

    March 1, 2026

    Amazon Announces $12 Billion Louisiana Data Center Investment to Boost AI and Cloud Capacity

    February 27, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.