A sophisticated LastPass phishing campaign has been identified, targeting users of the popular password manager with fraudulent emails designed to steal master passwords. The campaign, which began around January 19, utilizes social engineering tactics centered on false claims of scheduled maintenance.
Attackers are sending emails with subject lines urging recipients to perform an immediate backup of their vaults within a 24-hour window. This manufactured urgency is a classic hallmark of a backup phishing scam, aiming to bypass critical thinking and force users into hasty actions that compromise their password manager security.
The fraudulent email titles contain terms such as “infrastructure update,” “Backup,” “Maintenance,” and include call-to-action links, such as "create backup now," LastPass has reported.
Rather than initiating a legitimate backup process, this link redirects the victim through an AWS S3 bucket URL (group-content-gen2.s3.eu-west-3.amazonaws.com) before landing on a deceptive domain (mail-lastpass.com).
Once on the phishing site, users are prompted to enter their master password. Since the master password serves as the decryption key for the user's entire vault, divulging it grants threat actors unrestricted access to:
The LastPass security advisory confirms that the company does not ask customers to perform urgent backups or request master passwords via email. Key phishing prevention tips include:
If a user suspects they have clicked a malicious link, they should immediately change their master password and update the credentials for critical accounts stored in their vault.
A recent Veeam report highlighted that remote access compromise, phishing, social engineering, and rapid exploitation of flaws are currently the top attack vectors.