Fake Lastpass emails pose as password vault backup alerts
Recorded: Jan. 21, 2026, 6:03 p.m.
| Original | Summarized |
Fake Lastpass emails pose as password vault backup alerts News Featured Credential-stealing Chrome extensions target enterprise HR platforms Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Jordanian pleads guilty to selling access to 50 corporate networks Ingram Micro says ransomware attack affected 42,000 people Fortinet admins report patched FortiGate firewalls getting hacked Fake Lastpass emails pose as password vault backup alerts Microsoft shares workaround for Outlook freezes after Windows update You Got Phished? Of Course! You're Human... Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityFake Lastpass emails pose as password vault backup alerts Fake Lastpass emails pose as password vault backup alerts By Bill Toulas January 21, 2026 LastPass is warning of a new phishing campaign disguised as a maintenance notification from the service, asking users to back up their vaults in the next 24 hours. The LastPass Threat Intelligence, Mitigation, and Escalation (TIME) team believes that the campaign started on January 19 and observed phishing messages delivered from email addresses of the type 'support@lastpass[.]server8' and 'support@sr22vegas[.]com' with the following subject lines: The phishing emailSource: LastPass 7 Security Best Practices for MCP Related Articles: Backup Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Ingram Micro says ransomware attack affected 42,000 people New PDFSider Windows malware deployed on Fortune 100 firm's network Sponsor Posts Identity Governance & Threat Detection in one: Get a guided tour of our platform Discover how to scale IT infrastructure reliably without adding toil or burnout. Discover how phishing kits are sold and deployed. Download the full research report. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Fake Lastpass emails pose as password vault backup alerts. January 21, 2026 LastPass has issued a warning regarding a new phishing campaign designed to trick users into backing up their vaults, despite the company’s stated policy of never requesting master passwords. The campaign, initiated on January 19th, employs tactics commonly used in social engineering to induce urgency and bypass typical security awareness. The emails, mimicking legitimate LastPass communications, claim an impending infrastructure maintenance necessitates users to create encrypted backups of their vaults within a 24-hour window. Attackers are leveraging the appearance of official LastPass messaging to exploit user trust and encourage immediate action. The phishing operation originates from email addresses resembling ‘support@lastpass[.]server8’ and ‘support@sr22vegas[.]com,’ employing subject lines such as “LastPass Infrastructure Update: Secure Your Vault Now,” “Your Data, Your Protection: Create a Backup Before Maintenance,” and “Don’t Miss Out: Backup Your Vault (24-Hour Window).” These emails contain a link that directs recipients to a malicious website—mail-lastpass[.]com—which, at the time of publication, is offline. This tactic underlines the attackers’ intent to capture user credentials once they have been misled into providing them. LastPass’s Threat Intelligence, Mitigation, and Escalation (TIME) team determined that the campaign’s launch coincided with a holiday weekend in the United States, suggesting a deliberate strategy to capitalize on reduced staffing levels and potentially diminished vigilance among users. Furthermore, the attackers are employing a common tactic of exploiting anxieties surrounding system maintenance, capitalizing on the user’s need for uninterrupted access to their data. The company has reiterated its stance, emphasizing that it will never request user’s master passwords and urging recipients to report any suspicious emails to ‘abuse@lastpass.com.’ Historically, LastPass has been a frequent target of phishing campaigns utilizing diverse themes and lures. Notable examples include, in October of 2025, a campaign that exploited fabricated death claims to trigger a legacy inheritance process, and a week prior, another which leveraged fake breach alerts to persuade users to download a purportedly enhanced desktop version of the client application. These diverse approaches highlight the persistent sophistication of cybercriminals attempting to infiltrate users’ security defenses. The current campaign underscores the ongoing importance of verifying communication sources and exercising caution when responding to unsolicited requests for information or actions within password management systems. Users are encouraged to report any suspected phishing attempts to LastPass's abuse team and to maintain a heightened level of awareness when interacting with digital communications. Bill Toulas |