Key Findings Grade D
LastPass's 2022 breach exposed encrypted password vaults and unencrypted metadata for millions of users. Beyond the security incident itself, the company's terms provide minimal protection for users while granting LastPass broad rights to disclaim responsibility.
Major Security Breach History Severe
In 2022, attackers stole encrypted vault data for all users, plus unencrypted URLs and site names. Users with weak master passwords had their credentials exposed. The breach response was slow and initially downplayed severity.
Source: LastPass Security Incident DisclosureMinimal Liability for Breaches Severe
Despite the breach exposing vault data, LastPass's terms cap liability at the greater of $100 or fees paid. Users who suffered identity theft or account compromises have minimal legal recourse under the terms.
Source: Terms of Service, Limitation of LiabilityUnencrypted Metadata Stored Severe
Website URLs and other metadata are not encrypted in LastPass vaults. This means even if your passwords remain encrypted, an attacker knows which services you use—valuable information for targeted phishing attacks.
Source: Security Architecture, Breach AnalysisAggressive Arbitration Clause Moderate
Mandatory binding arbitration with class action waiver. Given the breach affected millions, this prevents coordinated legal action. No clear opt-out provision.
Source: Terms of Service, Dispute ResolutionTerms Changes Without Notice Moderate
LastPass reserves the right to modify terms with changes effective upon posting. While they "endeavor" to notify users, there's no guaranteed notice period for material changes.
Source: Terms of Service, ModificationsClosed Source Architecture Moderate
As a closed-source service, the security implementation cannot be independently verified. Given the breach history, this lack of transparency is particularly concerning.
Source: Product ArchitectureWhat This Means for You
The 2022 breach represents a catastrophic failure for a password manager. Attackers obtained complete vault backups that can be brute-forced offline. Users with weak master passwords should assume their credentials were compromised and change all passwords.
The terms heavily protect LastPass while leaving users exposed. The combination of unencrypted metadata, closed-source code, and minimal liability creates an unfavorable risk profile. Multiple security researchers and organizations have recommended migrating away from LastPass.
Lowest Rated - Recommend Switching
We recommend existing LastPass users migrate to alternatives like Bitwarden or 1Password. If you were a LastPass user during the 2022 breach, assume attackers have your encrypted vault and act accordingly: change all passwords, enable 2FA everywhere, and monitor accounts for suspicious activity. The company's breach response and terms do not inspire confidence in future security posture.