Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Facebook X (Twitter) Instagram
Sunday, December 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ICO Fines LastPass £1.2m After 2022 Breach
News

ICO Fines LastPass £1.2m After 2022 Breach

Team-CWDBy Team-CWDDecember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


LastPass has been fined £1.2m ($1.6m) by the UK’s data protection watchdog for security failings that led to a major 2022 data breach.

The Information Commissioner’s Office (ICO) judged that the password management provider failed its customers by not putting in place sufficiently robust technical and security measures.

The regulator admitted there’s no indication that threat actors were able to decrypt customer passwords. That’s because the master password required to access password vaults is stored locally on customers’ devices

However, an estimated 1.6 million users were affected by the breach. Personal information including customer names, emails, phone numbers, and stored website URLs were apparently compromised.

Read more on the LastPass breach: LastPass Hackers Stole Source Code

Information commissioner, John Edwards, said the watchdog continues to recommend the use of password managers by businesses and consumers as a way to improve identity and access management (IAM).

“However, as is clear from this incident, businesses offering these services should ensure that system access and use is restricted to ensure risks of attack are significantly reduced,” he added.

“LastPass customers had a right to expect the personal information they entrusted to the company would be kept safe and secure. However, the company fell short of this expectation, resulting in the proportionate fine being announced today.”

How the LastPass Data Breach Unfolded 

The breach involved several stages:

  • A threat actor compromised a LastPass employee’s corporate laptop to access the firm’s development environment and steal encrypted corporate credentials to a backup database
  • LastPass believed encryption keys were safe as they were stored in another location 
  • However, the same hacker targeted a senior employee with access to the decryption keys, after compromising their device by exploiting a known vulnerability in a third-party streamer
  • They installed a keylogger on the device which captured the employee’s master password, and they bypassed MFA with a trusted device cookie
  • The hacker accessed the employee’s personal and business LastPass vaults, linked under the same master password
  • Inside the business vault, they found AWS access and decryption keys
  • With this information and the previously stolen encrypted credentials they were able to extract the contents of the backup database containing personal information

Chris Linnell, associate director of data privacy at consultancy Bridewell, pointed to several lessons learned.

“For service providers, this is a reminder that security isn’t just about the product itself,” he explained. “You need strong information security and privacy frameworks in place, and you can’t ignore the less obvious risks – backups, secondary databases, and other systems that attackers often target.”

The breach also shows why acceptable use policies matter, Linnell added.

“Staff need clear guidance on what they can and can’t do with company devices,” he said. “In this case, the vulnerability came from a third-party streaming service – approved or not – which also serves as another reminder how much risk sits in the supply chain. We’ve seen this before, and it’s not going away.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
Next Article Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
Team-CWD
  • Website

Related Posts

News

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025
News

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025
News

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.