Why It’s Time to Leave LastPass

Why It’s Time to Leave LastPass: A Security Wake-Up Call

For years, LastPass marketed itself as the convenient, secure solution for password management. But a series of catastrophic security failures has exposed a troubling reality: LastPass’s parent company prioritized profits over the fundamental security of your most sensitive data. If you’re still using LastPass, this is your wake-up call to migrate immediately and change every important password you’ve stored there.

The Breach That Changed Everything

In August 2022, LastPass announced a security incident. What initially seemed like a contained breach quickly unraveled into one of the worst password manager compromises in history. By December 2022, the full scope became clear: attackers had stolen encrypted password vaults, along with unencrypted metadata including website URLs, usernames, and notes.

But here’s where it gets worse. The attackers didn’t just grab random data—they obtained copies of backup data from the company’s cloud storage, including customer vault data and cryptographic keys. This means that every password you ever stored in LastPass is potentially in the hands of criminals, who have unlimited time to crack your master password offline.

A Pattern of Negligence

This wasn’t LastPass’s first rodeo with security incidents. Previous breaches occurred in 2011, 2015, and 2021. Each time, the company downplayed the severity and assured users their data was safe. The pattern reveals something more troubling than isolated incidents: it demonstrates systematic failures in security culture.

Even more damning, security researchers discovered that LastPass had been using only 100,100 iterations of the PBKDF2 password hashing algorithm for older accounts—far below the recommended standard. This weak hashing makes it significantly easier for attackers to crack master passwords through brute force attacks. While newer accounts had better protection, the company failed to force older users to upgrade, leaving millions vulnerable.

The GoTo Problem: When Private Equity Takes Over

LastPass’s parent company, GoTo (formerly LogMeIn), embodies everything wrong with private equity-driven tech companies. After being acquired in 2015, LastPass became just another product in a portfolio designed to extract maximum revenue. Security investments took a backseat to monetization strategies and shareholder returns.

The company’s response to the 2022 breach exemplified this profit-first mentality. Rather than immediately forcing password resets or offering comprehensive breach support, they released information in drips, minimized the severity, and left users to figure out the implications themselves. Their legal liability mattered more than your actual security.

Why You Need to Act Now

If you’re still using LastPass, you’re gambling with every account you own. Here’s what you need to understand:

Your vault may already be compromised. Attackers have had over two years to work on cracking stolen vaults. If your master password wasn’t exceptionally strong, or if you were using an older account with weak hashing, assume your passwords are already in the hands of criminals.

Metadata exposure is devastating. Even if your passwords remain encrypted, attackers know which sites you use, which accounts matter to you, and potentially sensitive information from unencrypted notes. This intelligence alone enables targeted attacks.

Trust is irreplaceable. Once a security company demonstrates they can’t protect your data, they’ve lost the only thing that matters. LastPass had one job—keeping your passwords secure—and they failed catastrophically.

Making the Switch: Better Alternatives

The good news is that moving away from LastPass is straightforward, and you have excellent options depending on your priorities.

KeePass and KeePassXC: Maximum Control and Privacy

For those who want complete ownership of their data, KeePass (Windows) and KeePassXC (cross-platform) represent the gold standard in password management. These open-source solutions store your encrypted vault locally on your devices, eliminating the cloud security concerns that plagued LastPass.

Why choose KeePass/KeePassXC:

  • Your vault never touches someone else’s servers
  • Open-source code means security experts worldwide can audit the software
  • No subscription fees, no corporate ownership changes, no profit motives
  • Complete control over encryption standards and backup strategies
  • Extensible with plugins for additional functionality

The tradeoff is convenience. You’ll need to manually sync your database across devices (using services like Synctone, your own file server, or USB drives), and there’s a steeper learning curve. But for maximum security and privacy, nothing beats keeping your passwords on hardware you control.

Bitwarden: The Best of Both Worlds

If you want strong security with modern convenience, Bitwarden is the standout choice. This open-source password manager offers cloud sync while maintaining genuine security commitments. Unlike LastPass, Bitwarden’s business model and architecture prioritize protection over profits.

Why Bitwarden excels:

  • Direct import from LastPass makes migration painless
  • Full desktop, mobile, and browser support
  • Open-source codebase available for security auditing
  • End-to-end encryption with zero-knowledge architecture
  • Can be self-hosted if you prefer complete control
  • Affordable premium tier ($10/year) funds continued security development
  • Independent company focused solely on password management

Bitwarden’s transparent security practices, regular audits by third-party firms, and commitment to open-source development demonstrate the security-first culture that LastPass abandoned.

Your Migration Action Plan

Don’t put this off. Here’s what you need to do today:

Step 1: Choose your new password manager. Pick KeePass/KeePassXC if you prioritize local control, or Bitwarden if you want cloud convenience with strong security.

Step 2: Export from LastPass. Log into LastPass and export your vault. Both KeePass and Bitwarden can import LastPass data directly.

Step 3: Import to your new manager. Follow the straightforward import process in your chosen tool.

Step 4: Change critical passwords immediately. Start with financial accounts, email, healthcare, and any accounts with personal information. Don’t reuse old passwords—generate strong, unique ones using your new password manager.

Step 5: Enable two-factor authentication everywhere possible. This adds a critical second layer of protection beyond passwords alone.

Step 6: Delete your LastPass account. Once you’ve migrated everything and verified your new setup works, permanently delete your LastPass account. Don’t leave your old vault sitting in their compromised infrastructure.

The Bigger Lesson

The LastPass disaster teaches us something crucial about trusting third parties with our most sensitive data. When a company gets acquired, changes leadership, or shifts priorities toward growth over security, your trust becomes misplaced. The breach wasn’t just a technical failure—it was an organizational one driven by corporate incentives that placed shareholder value above user protection.

Whether you choose the local control of KeePass or the secure convenience of Bitwarden, you’re making a choice for better security practices and companies that earn your trust through transparency and action, not marketing promises.

Your passwords are the keys to your digital life. Don’t leave them with a company that’s already proven they can’t protect them. Make the switch today, change those passwords, and sleep better knowing you’ve taken control of your security.


The author runs an independent IT support business with over 20 years of experience in security implementations and system administration. He migrated away from LastPass years ago and helps clients implement robust password management solutions.

 

Leave a Reply