LastPass Warns of Phishing Campaign Targeting Its Customers

Image generated by Google Gemini

Password manager users are under siege again.

LastPass Warns of Phishing Campaign Targeting Its Customers

LastPass Warns of Phishing Campaign Targeting Its Customers

Password manager users are under siege again.

Cybercriminals have launched a sophisticated phishing campaign targeting LastPass customers with urgent “maintenance” alerts designed to steal master passwords within hours. Security experts are calling this latest attack “alarmingly effective” because it exploits users’ trust in legitimate security notifications during a strategically chosen holiday weekend.

The scheme revolves around fake emails claiming users must backup their password vaults within 24 hours to prevent data loss. But here’s the twist: clicking those “backup” links doesn’t create any backup—it hands over the keys to everything users have tried to protect.

LastPass detected the campaign starting Jan. 19, with attackers sending messages from addresses like ‘[email protected]’ and ‘[email protected]’ with subject lines including “LastPass Infrastructure Update: Secure Your Vault Now” and “Protect Your Passwords: Backup Your Vault (24-Hour Window).”

The timing wasn’t random—threat actors deliberately launched during the U.S. holiday weekend, banking on reduced security staffing to maximize their window before detection and takedown.

The attackers’ holiday weekend timing

Cybercriminals have perfected the art of timing, and this campaign proves it. The phishing messages craft a believable story about upcoming infrastructure maintenance requiring immediate local backups to prevent data loss.

The fake emails arrive designed to appear as genuine LastPass communications, explaining that users need to back up their vaults locally due to system updates. These messages include convincing language like “While your data remains fully protected at all times, creating a local backup ensures you have uninterrupted access to your credentials during the maintenance window.”

Security teams discovered that clicking the embedded “Create Backup Now” button redirects users to the phishing site ‘mail-lastpass.com’—though investigators found the malicious domain was offline by the time their analysis was published.

The technical infrastructure reveals serious planning. The malicious links direct victims through an AWS-hosted redirect at ‘group-content-gen2.s3.eu-west-3.amazonaws.com/5yaVgx51ZzGf’ before landing on the primary phishing site, demonstrating multiple layers designed to evade detection.

Why this attack pattern keeps succeeding

This campaign isn’t happening in isolation—it’s part of a disturbing trend that’s been building throughout 2025. Security analysis from October revealed that major password managers including LastPass, Bitwarden, and 1Password all faced impersonation attacks within a three-week span.

The psychology behind these attacks exploits a crucial vulnerability: heightened security awareness. Because password managers protect all of a user’s online accounts with a single master password, fake security alerts create more fear and urgency than typical phishing attempts. If attackers successfully obtain that one master password, they gain access to victims’ complete digital lives, including corporate systems and financial accounts.

Previous campaigns this year have shown increasing sophistication. A September 2025 blog about phishing simulation training revealed that attackers are using AI-powered voice phishing to impersonate company executives, with some campaigns specifically targeting password manager users through SMS messages, phone calls, and even deepfake audio impersonations.

Three months ago, the “death certificate” scam demonstrated how cybercriminals continuously adapt their strategies. That campaign exploited LastPass’s emergency access feature by claiming family members had died and requested vault access, complete with fabricated agent IDs and phone calls from fake LastPass staff members.

The threat landscape has evolved beyond simple email phishing to include multi-channel attacks that combine emotional manipulation with technical sophistication, making even security-conscious users vulnerable to well-crafted deception.

What this means for your digital security

LastPass categorically states it will never request master passwords or demand immediate software updates via email links. Users who received suspicious emails should forward them to [email protected] and verify any maintenance notifications through official LastPass channels before taking action.

Security teams are tracking specific IP addresses and malicious URLs from yesterday’s investigation. The AWS-hosted redirect and associated infrastructure at IPs 104.21.86.78, 172.67.216.232, and 188.114.97.3 are being actively monitored and neutralized by security teams working around the clock to disrupt the campaign.

This latest attack demonstrates how threat actors exploit trust in legitimate security features. That “death certificate” campaign used emergency access features, while recent campaigns have targeted both traditional master passwords and modern passkeys, as well as credentials for cryptocurrency wallets including Binance, Coinbase, Kraken, and Gemini.

The sophistication extends beyond email—attackers are now using multiple communication channels including SMS messages and direct phone calls to pressure victims into entering credentials on phishing sites. Some campaigns even include follow-up calls from individuals impersonating LastPass support staff, creating a coordinated social engineering assault designed to overwhelm users’ natural skepticism.

Security experts recommend immediately reporting suspicious communications and never providing credentials in response to unsolicited requests, regardless of how urgent or legitimate they appear. Always verify through official channels, and remember that legitimate security companies will never ask for master passwords or create artificial time pressure for critical security decisions.

Researchers warn that attackers are abusing Google notifications and cloud services to deliver phishing emails that bypass traditional email security controls. 

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.