UK Information Commissioner fines a password manager 1.2 million pounds for data breach
February 1, 2026
The raison d’etre of password manager companies is to protect and manage customers’ passwords for the plethora of passwords that they must use for their work, play or just personal use. Those companies must store customer passwords/logins in their data bases. Of course it would be disastrous if those companies suffered a data breach and even more damaging if personal details of their customers were stolen. Which is exactly what happened to LasstPass in the UK. The UK Information Commissioner found that LastPass suffered a data breach which resulted in personal information of 1.6 million individuals being compromised. As the media makes clear, the hacker was very thorough in testing the weaknesses in LastPass’s defences.
They first accessed an employee’s corporate lap top to gain encrypted company credentials then targeted another employee who had access to decryption key by way of a known vulnerability in a third party streaming service. That gave the hackers access to the LastPass vaults which were only protected by a single master password. That gave them access to the access key to the Amazon Web Service which, combined with other stolen information enabled hackers to extract personal information on the backup database.
As if it need be said, proper defences should not be focused on a perimeter protection. Comprehensive protection throughout the organisation is necessary. That means protection at all levels and any point of contact with the internet.
The media release provides:
-
- Service which promises to help people improve their security, has failed them, leaving them vulnerable
- Combination of two isolated incidents enabled hacker to steal personal information relating to 1.6m customer
- ‘Zero knowledge’ encryption system ensures customer passwords and vaults are not decrypted
We have fined password manager provider LastPass UK Ltd £1.2 million following a 2022 data breach that compromised the personal information of up to 1.6 million of its UK users.
We found that LastPass failed to implement sufficiently robust technical and security measures, which ultimately enabled a hacker to gain unauthorised access to its backup database. There is no evidence that hackers were able to unencrypt customer passwords as these are stored locally on customer devices and not by LastPass.
The incidents occurred in August 2022 when a hacker gained access first to a corporate laptop of an employee based in Europe and then to a US-based employee’s personal laptop on which the hacker implanted malware and then was able to capture the employee’s master password. The combined detail from both incidents enabled the hacker to access LastPass’ backup database and take personal information which included customer names, emails, phone numbers, and stored website URLs.
John Edwards, UK Information Commissioner, said:
“Password managers are a safe and effective tool for businesses and the public to manage their numerous login details and we continue to encourage their use. However, as is clear from this incident, businesses offering these services should ensure that system access and use is restricted to ensure risks of attack are significantly reduced.
“LastPass customers had a right to expect the personal information they entrusted to the company would be kept safe and secure. However, the company fell short of this expectation, resulting in the proportionate fine being announced today.
“I call on all UK business to take note of the outcome of this investigation and urgently review their own systems and procedures to make sure, as best as possible, that they are not leaving their customers and themselves exposed to similar risks”.
Details of the two incidents
Incident one
-
- A hacker compromised a LastPass employee’s corporate laptop and gained access to the company’s development environment.
- No personal information was taken however encrypted company credentials were. If decrypted, this would allow access to the company’s backup database.
- LastPass took steps to mitigate the hacker’s activity and believed encryption keys remained safe as they were stored outside of the area accessed by the hacker in the account vaults of four senior employees.
Incident two
-
- The hacker then targeted one of the senior employees who had access to the decryption keys, gaining access to their personal device via a known vulnerability in a third-party streaming service.
- A keylogger was installed capturing the employee’s master password and multi factor authentication was bypassed using a trusted device cookie.
- The hacker then gained access to the employee’s personal and business LastPass vaults, which were linked using a single master password.
- The hacker then gained access to the employee’s business vault which contained the Amazon Web Service (AWS) access key and decryption key.
- This information, combined with information taken the day before, enabled the hacker to extract the contents of the backup database which contained the personal information.