Softplorer Logo

Affiliate links present. Disclosure

Password Managers — Guide

The LastPass 2022 breach — what was actually taken and what it means

What makes this confusing

In August 2022 LastPass disclosed that an attacker had accessed its development environment. That disclosure was followed by a second in November, and then a third in December that was materially different from the first two: the attacker had used credentials from the August incident to access a cloud storage backup containing encrypted customer vault data. The final picture took months to assemble, and by the time it was complete, the original framing — 'a developer account was compromised' — had been replaced by something significantly more serious.

The confusion that followed was understandable. LastPass's communications emphasised that vault data was encrypted, which is true. Many security commentators noted that zero-knowledge architecture means LastPass cannot decrypt your passwords, which is also true. Headlines ranged from 'LastPass breach: your passwords are safe' to 'LastPass users should change everything immediately.' Both framings captured something real while missing something else.

The actual situation requires two separate analyses: one for encrypted credential content, and one for the URL metadata that was stored alongside it. These two categories have different risk profiles, different timeframes, and different remediation options. They were frequently conflated in the coverage, which produced more heat than clarity.

What people usually assume

The most common assumption is that 'encrypted' means 'safe' without qualification. Encryption shifts the problem rather than eliminating it. Vault credentials are encrypted using a key derived from the master password. An attacker with a stolen vault backup cannot decrypt it without cracking the master password — which is computationally expensive if the password is strong and the key derivation function used adequate iterations. For accounts with strong master passwords and modern iteration counts, the vault contents are practically safe against offline brute-force. For accounts with weak master passwords, or accounts that used LastPass's historically low default PBKDF2 iteration counts — some legacy accounts had as few as 1 iteration at the time of the breach — the risk window is substantially larger.

A second assumption is that the damage is bounded by the credential content — that once the master password question is resolved, the breach is resolved. This misses what was not encrypted. Alongside each encrypted vault entry, LastPass stored the website URL in plaintext. The attacker obtained a complete map of every affected user's online accounts: every service they use, every site they have a login for. This URL metadata was never part of the zero-knowledge model. It was stored in plaintext by design — the same design choice that made vault indexing and search faster — and it is now in attacker possession permanently. No future infrastructure improvement, no PBKDF2 iteration increase, no platform rebuild changes that.

A third assumption — common among users who have not rotated passwords — is that if nothing bad has happened yet, nothing will. Credential data from large breaches is not immediately monetised. It enters a market where it may be used weeks, months, or years later, depending on the value of the specific accounts and the economics of the attacker's operation. The absence of a visible account compromise is not evidence that the vault backup is not in active use. It is evidence that it hasn't been successfully exploited yet, or that it has been used in ways that aren't visible to the account holder.

What's actually true

The breach produced two distinct risk categories. The first is time-bounded and password-dependent: encrypted vault backups are in attacker possession, and their value decays as master passwords are changed and credentials are rotated. For accounts where the master password was strong (12+ characters, not a dictionary word or phrase, not reused elsewhere) and where the account had modern PBKDF2 iteration counts, the practical brute-force risk is low — the computational cost of cracking makes targeted attacks economically unattractive except for high-value individuals. For accounts where the master password was weak, where iteration counts were historical minimums, or where the master password was reused on other sites that were themselves breached, the risk window is meaningfully wider.

The second risk category is permanent and affects every user whose data was in the breach: the URL metadata exposure. The list of every site an affected user has accounts on is now in attacker possession regardless of master password strength. This has practical consequences beyond the breach itself. It enables highly targeted phishing campaigns against the specific services each user is known to use. It provides context for social engineering attacks that generic breach data doesn't. It creates a persistent information advantage for attackers that cannot be neutralised by password rotation or manager migration. Changing to Bitwarden or Proton Pass is the right security decision for many users — but it does not erase the URL data that was already taken.

LastPass's post-breach response included raising PBKDF2 iteration counts to 600,000 for all accounts, rebuilding compromised infrastructure, and notifying customers. These are meaningful improvements. They address the forward-looking question of how future LastPass data would be protected. They do not address the URL metadata exposure from the existing incident, and they do not change the fact that vault backups with varying iteration counts are already in attacker possession.

Where this leads

LastPass

If your LastPass master password was strong — 12+ characters, unique to LastPass, not a pattern — your credential content risk is low relative to the general breach population. The URL metadata exposure still applies. The remaining question is whether LastPass's architectural approach, including its closed-source codebase and US jurisdiction, aligns with your current trust model.

Is LastPass still safe — the decision framework
Proton Pass

If you want the architectural response to the URL metadata gap — a manager that encrypts URL metadata, titles, and usernames, not just passwords — Proton Pass is the only provider in this comparison built around that premise. The Swiss jurisdiction and open-source clients add additional trust dimensions.

See Proton Pass's metadata encryption architecture
Bitwarden

If you want to migrate away from LastPass and want the most complete, auditable alternative — open-source full stack, Cure53 audited, clean breach history, free unlimited tier — Bitwarden is the most common destination. Import from LastPass CSV is fully supported.

LastPass alternatives and how to migrate
Keeper

If you are evaluating the breach in the context of a business or regulated organisation — where the 2022 incident may create compliance reporting obligations or risk register entries — the analysis shifts from personal threat modelling to regulatory and contractual obligations. Keeper's FedRAMP authorization and clean breach history may be relevant to that evaluation.

See Keeper's compliance and trust posture

Limits of this guide

This guide covers what was disclosed in LastPass's public breach notifications between August and December 2022, and subsequent clarifications. It does not cover any security incidents that may have occurred after that period. LastPass's infrastructure rebuild and platform changes may have materially altered its security posture since then — any evaluation of the current product should include reviewing LastPass's most recent security documentation, not only historical incident reporting.

The risk assessment here is probabilistic, not deterministic. It is not possible from outside LastPass to know whether any specific vault backup has been subject to active cracking attempts, whether the URL metadata is being actively used in targeted attacks, or what the attacker's timeline and targeting criteria are. 'Your account hasn't been compromised yet' and 'your vault data is not being actively worked on' are not the same statement.

The credential content risk analysis assumes that the master password and its iteration count determine the practical brute-force risk. Other attack vectors — phishing using the URL metadata, social engineering based on the account list, credential stuffing against services where the same password was reused — operate independently of the master password strength and are not addressed by vault encryption. The breach created information asymmetry that extends beyond the vault contents themselves.

Browse all providersAll password manager guidesQuick decisions