Last weekend LastPass' network was compromised and that a list of email addresses along with the hashes of the master passwords were stolen. It is being recommended that LastPass users change their passwords on several security websites. https://blog.lastpass.com/2015/06/lastpass-security-notice.html/
According to the LastPass link above, "LastPass strengthens the authentication hash with a random salt and 100,000 rounds of server-side PBKDF2-SHA256, in addition to the rounds performed client-side.".
Is there any real reason for someone with a strong (30+ random characters) password to bother changing their master password? My understanding was that with a random salt and 100,000 rounds of PBKDF2-SHA256 and a long password, the password would be safe from brute force attacks even if a hacker had a budget equal to the world GDP. I am asking this question to make sure I am not missing something.