Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords

Posted on January 21, 2026January 21, 2026 By CWS

Ravie LakshmananJan 21, 2026Email Safety / Malware
LastPass is alerting customers to a brand new energetic phishing marketing campaign that is impersonating the password administration service, which goals to trick customers into giving up their grasp passwords.
The marketing campaign, which started on or round January 19, 2026, includes sending phishing emails claiming upcoming upkeep and urging them to create an area backup of their password vaults within the subsequent 24 hours. The messages, LastPass mentioned, include the next topic strains –

LastPass Infrastructure Replace: Safe Your Vault Now
Your Knowledge, Your Safety: Create a Backup Earlier than Upkeep
Do not Miss Out: Backup Your Vault Earlier than Upkeep
Vital: LastPass Upkeep & Your Vault Safety
Shield Your Passwords: Backup Your Vault (24-Hour Window)

The emails are designed to steer unsuspecting customers to a phishing website (“group-content-gen2.s3.eu-west-3.amazonaws[.]com/5yaVgx51ZzGf”) that then redirects to the area “mail-lastpass[.]com.”
The corporate emphasised that it’s going to by no means ask customers for his or her grasp passwords and that it is working with third-party companions to take the malicious infrastructure down. It has additionally shared the e-mail addresses from which the messages originate –

assist@sr22vegas[.]com
assist@lastpass[.]server8
assist@lastpass[.]server7
assist@lastpass[.]server3

“This marketing campaign is designed to create a false sense of urgency, which is among the commonest and efficient techniques we see in phishing assaults, a spokesperson for the Menace Intelligence, Mitigation, and Escalation (TIME) crew at LastPass informed The Hacker Information in an announcement.
“We would like prospects and the broader safety neighborhood to bear in mind that LastPass won’t ever ask for his or her grasp password or demand speedy motion beneath a decent deadline. We thank our prospects for staying vigilant and persevering with to report suspicious exercise.”
The event comes months after LastPass cautioned customers of an information-stealing marketing campaign concentrating on Apple macOS customers by pretend GitHub repositories that distribute malware-laced packages masquerading because the password supervisor and different well-liked software program.

The Hacker News Tags:Fake, LastPass, Maintenance, Master, Messages, Passwords, Targeting, Users, Warns

Post navigation

Previous Post: CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
Next Post: Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Related Posts

U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud The Hacker News
New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards The Hacker News
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks The Hacker News
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The Hacker News
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024 The Hacker News
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • Critical GNU InetUtils Vulnerability Allows Unauthenticated Root Access Via “-f root”

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark