+70-page Enterprise Passkey Whitepaper:
Learn how leaders get +80% passkey adoption. Trusted by Rakuten, Klarna & Oracle
The LastPass data breach of 2022-2023 serves as a reminder of how sophisticated cyber attacks can cascade into long-term security disasters. This comprehensive analysis breaks down the incident, its impact, and crucial lessons for organizations looking to strengthen their security posture.
The breach's consequences have been severe and long-lasting:
The breach began when attackers gained unauthorized access to LastPass's development environment through a single compromised developer account. At this stage, the attackers obtained:
Why are Passkeys important?
Passwords & phishing put enterprises at risk. Passkeys offer the only MFA solution balancing security and UX. Our whitepaper covers implementation and business impact.

What initially seemed contained quickly escalated when attackers leveraged the stolen information to:
Subscribe to our Passkeys Substack for the latest news.
In a revealing update, LastPass disclosed that attackers had:
Igor Gjorgjioski
Head of Digital Channels & Platform Enablement, VicRoads
Corbado proved to be a trusted partner. Their hands-on, 24/7 support and on-site assistance enabled a seamless integration into VicRoads' complex systems, offering passkeys to 5 million users.
Passkeys that millions adopt, fast. Start with Corbado's Adoption Platform.
Start Free TrialThe LastPass data breach serves as a crucial lesson in the importance of comprehensive security measures and proper incident response. Organizations must take a proactive approach to security, implementing multiple layers of protection while preparing for potential breaches. By learning from this incident, companies can better protect their assets and maintain trust with their customers.
Attackers used source code and technical information stolen from LastPass's development environment in August 2022 to access a third-party cloud storage service holding customer vault backups. This multi-stage escalation unfolded over several months before the full scope was disclosed in early 2023.
Attackers obtained both the encrypted vault backups and, critically, the decryption keys by deploying a keylogger on a senior DevOps engineer's home computer. Capturing master passwords alongside decryption keys meant encryption alone could not fully protect customer data.
A senior DevOps engineer's personal home computer was compromised through a vulnerability in third-party media software, a risk that robust endpoint protection policies for remote work devices are designed to prevent. Restricting personal software installation and enforcing security audits of home setups are key mitigations.
Exposed data spanned two categories: customer information including names, billing addresses, email addresses, phone numbers and IP addresses, plus technical data covering customer vault backups, DevOps secrets, cloud-based backup storage and MFA/Federation Database backups. This combination of personal and infrastructure data made the breach especially damaging.
Related Articles
Table of Contents