Company type | Private |
---|---|
Industry | |
Founded | 2008 |
Headquarters | 125 High Street, , United States |
Key people | Karim Toubba, CEO (2022-Present) |
Revenue | $200 million (2021) |
Owners |
|
Number of employees | 800+ (2024) |
Website | lastpass |
Footnotes / references [1][2] |
LastPass is a password manager application.[3] The standard version of LastPass comes with a web interface, but also includes plugins for various web browsers and apps for many smartphones. It also includes support for bookmarklets.
Founded in 2008 by four developers,[4][5] Lastpass was acquired by GoTo (formerly LogMeIn Inc.) for $110 million in 2015.[6] LastPass was spun-off from GoTo into a stand-alone business in 2024.[7]
LastPass suffered significant security incidents between 2011 and 2022. Notably, in late 2022, user data, billing information, and vaults (with some fields encrypted and others not)[a][8] were breached, leading many security professionals to call for users to change all their passwords and switch to other password managers.[9]
A user's content in LastPass, including passwords and secure notes, is protected by one master password. The content is synchronized to any device the user uses the LastPass software or app extensions on. Information is encrypted with AES-256 encryption with PBKDF2 SHA-256, salted hashes, and the ability to increase password iterations value. Encryption and decryption takes place at the device level.[10][11]
LastPass has a form filler that automates password entering and form filling, and it supports password generation, site sharing and site logging, and two-factor authentication. LastPass supports two-factor authentication via various methods including the LastPass Authenticator app for mobile phones as well as others including YubiKey.[12] LastPass is available as an extension to many web browsers, including Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge, Vivaldi, and Opera. It also has apps available for smartphones running the Android, iOS, or Windows Phone operating systems. The apps have offline functionality.[10]
Unlike some other major password managers, LastPass offers a user-set password hint, allowing access when the master password is missing.[13]
On December 2, 2010, it was announced that LastPass had acquired Xmarks, a web browser extension that enabled password synchronization between browsers. The acquisition meant the survival of Xmarks, which had financial troubles, and although the two services remained separate, the acquisition led to a reduced price for paid premium subscriptions combining the two services.[14][15] On March 30, 2018, the Xmarks service was announced to be shut down on May 1, 2018, according to an email to LastPass users.[16]
On October 9, 2015, GoTo acquired LastPass for $110 million. The company was combined under the LastPass brand with a similar product, Meldium, which had already been acquired by GoTo.[3][17][18]
On February 3, 2016, LastPass unveiled a new logo. The previous logo, which prominently featured an asterisk, was the subject of a trademark lawsuit filed in early 2015 by E-Trade, whose logo also features an asterisk.[19]
On March 16, 2016, LastPass released LastPass Authenticator, a free two-factor authentication app.[20][21]
On November 2, 2016, LastPass announced that free accounts would now support synchronizing user content to any device, a feature previously exclusive to paid accounts. Earlier, a free account on the service meant it would sync content to only one app.[22][23]
In August 2017, LastPass announced LastPass Families, a family plan for sharing passwords, bank account info, and other sensitive data among family members for a $48 annual subscription. They also doubled the price of the Premium version without adding any new features to it. Instead, some features of the free version were removed.[24]
On February 16, 2021, LastPass announced that from March 16, free versions would be usable on only desktop or mobile devices, rather than both. Any user wishing to continue using both would have to pay for the premium (i.e. paid for) version. They would also discontinue email support for Free users at the same time.[25]
On December 14, 2021, GoTo announced that LastPass would be established as an independent company.[26] The spin-off was completed in May 2024, with LastPass being directly controlled by Francisco Partners and Elliott Management, the private equity firms that took GoTo private in 2020.[7][27]
In March 2009, PC Magazine awarded LastPass five stars, an "Excellent" mark, and their "Editors' Choice" for password management.[28] A new review in 2016 following the release of LastPass 4.0 earned the service again five stars, an "Outstanding" mark, and "Editors' Choice" honor.[29]
In July 2010, LastPass's security model was extensively covered and approved of by Steve Gibson in his Security Now podcast episode 256.[30] He also revisited the subject and how it relates to the National Security Agency in Security Now podcast episode 421.[31]
In October 2015 when GoTo acquired LastPass, founder Joe Siegrist's blog was filled with user comments voicing criticism of GoTo.[32] Web sites ZDNet, Forbes and Infoworld posted articles mentioning the outcry by existing customers, some of whom said they would refuse to do business with GoTo, and raised other concerns about GoTo's reputation.[33][34][35]
In a 2017 Consumer Reports article Dan Guido, the CEO of Trail of Bits, called LastPass a popular password manager (alongside Dashlane, KeePass, and 1Password), with the choice between them mostly down to personal preference.[13] In March 2019, Lastpass was awarded the Best Product in Identity Management award during the seventh annual Cyber Defense Magazine InfoSec Awards.[36]
On Monday, June 15, 2015, LastPass posted a blog post indicating that the LastPass team had discovered and halted suspicious activity on their network the previous Friday. Their investigation revealed that LastPass account email addresses, password reminders, server per user salts, and authentication hashes were compromised; however, encrypted user vault data had not been affected. The company blog said, "We are confident that our encryption measures are sufficient to protect the vast majority of users. LastPass strengthens the authentication hash with a random salt and 100,000 rounds of server-side PBKDF2-SHA256, in addition to the rounds performed client-side. This additional strengthening makes it difficult to attack the stolen hashes with any significant speed."[37][38]
In 2021, it was discovered that the Android app contained third-party trackers.[39] Also, at the end of 2021, an article at the site BleepingComputer reported that LastPass users were warned that their master passwords were compromised.[40]
In August 2022, a hacker stole a copy of a customer database, and some copies of the customers' password vaults. The stolen information includes names, email addresses, billing addresses, partial credit cards and website URLs.[41] Some of the data in the vaults was unencrypted, while other data was encrypted with users' master passwords.[41] The security of each user's encrypted data depends on the strength of the user's master password, or whether the password had previously been leaked, and the number of rounds of encryption used. Details of the number of rounds for each customer was stolen.[41] Some customer vaults were more vulnerable to decryption than others.
LastPass revealed this through a series of blog posts and reports from August 25, 2022,[42] and by notifying customers. In November 2022, LastPass assured users that passwords stored with the service were still secure.[43] LastPass offered more comprehensive advice to individual customers[44] and business users[45] in March 2023.
The customer data included customers' names, billing addresses, phone numbers, email addresses, IP addresses and partial credit card numbers, and the number of rounds of encryption used, MFA seeds and device identifiers.[46] The vault data included, for each breached user, unencrypted website URLs[b][8] and site names, and encrypted usernames, passwords and form data for those sites.[46] According the reports, the stolen info did not include a plain text copy of the user's master password.[41]
The threat actor first gained unauthorized access to portions of their development environment, source code, and technical information through a single compromised developer's laptop.[42] LastPass responded by re-building their development environment and rotating certificates.[47] The actor, however, used the information to target and hack the computer of a senior DevOps engineer,[47] and used a key logger to obtain that engineer's master password. The actor then gained access to an encrypted corporate vault, which was shared between just four engineers. That vault contained keys to S3 buckets of the backups to customer files.[48] The actor obtained the user database of August 14, 2022, and several password vault backups taken between August 20 and September 16, 2022.[41]
LastPass's December report suggested that, if customers had selected a strong master password and elected, under the account's advanced settings, to uses the many thousands of rounds of PBKDF2-HMAC-SHA-256 encryption (600,000 iterations recommended by OWASP, as of 2023),[49] it would take millions of years to decrypt the passwords.[50] Prior to June 2012, customers had by default a single PBKDF2-HMAC-SHA-256 hash applied to their master password, with site usernames and passwords encrypted with the weak AES-ECB cipher mode. The default iteration count that was later increased for new customers to 500 encryption cycles, then later increased to 5000. By February 2018 the default for new customers was 100,100 iterations, a minimum master password length of 12 characters, and the stronger AES-CBC cipher mode employed.[50][51][52] Old customers using old defaults may not have had their encryption rounds increased, nor have been forced to use a long password.
Commentators expressed concerns that if a user's master password was weak or leaked,[46] the encrypted parts of the customer's data could be decrypted.[53] Initially, LastPass stated no action was necessary for the majority of its customers,[50] but other sources recommended changing all passwords and vigilance against possible phishing attacks.[54][55] Some sources criticized LastPass's response,[56] and raised additional concerns over the number of rounds of encryption that were required.
A class-action lawsuit was initiated in early 2023, with the anonymous plaintiff stating that LastPass failed to keep users' information safe.[57] Of particular concern in the lawsuit was the increased risk of the details being used in phishing attacks.
In September 2023, a potential link was made between the 2022 data theft and a total of more than $35 million in cryptocurrency that had been stolen from over 150 victims since December 2022. The link was made due the fact that almost all victims were LastPass users.[58]
((cite web))
: CS1 maint: unfit URL (link)
Proprietary | |
---|---|
Open source | |
Discontinued | |