LastPass has issued an urgent warning to its customers about an ongoing phishing campaign detected on October 13, 2025. The campaign uses social engineering tactics, sending emails that falsely claim LastPass has been hacked. These emails pressure users to click a link to a new desktop app to "maintain vault security." The link leads to a well-crafted phishing site designed to harvest the user's master password. LastPass has affirmed that its systems have not been breached and that this is a malicious attempt to steal user credentials. The campaign was strategically launched over a holiday weekend in the U.S. to slow detection and response.
This is a classic credential phishing campaign that relies on impersonation and creating a false sense of urgency.
Spearphishing via Service (T1598.003). The attackers send emails that appear to be official communications from LastPass.hello@lastpasspulse[.]blogWe Have Been Hacked - Update Your LastPass Desktop App to Maintain Vault Securitylastpassdesktop[.]com.lastpassdesktop[.]app, has also been registered, likely for future use.The primary and most severe impact is the potential theft of a user's LastPass master password.
A compromised master password gives an attacker complete access to a user's entire password vault. This includes credentials for all saved websites, secure notes, and other sensitive data.
This would lead to a catastrophic personal data breach for the victim, enabling attackers to:
| Type | Value | Description |
|---|---|---|
| Domain | lastpassdesktop[.]com |
Primary phishing site domain. |
| Domain | lastpassdesktop[.]app |
Secondary registered domain for the campaign. |
| Email Address | hello@lastpasspulse[.]blog |
Sender address used in the phishing emails. |
@lastpass.com or @logmein.com.Multi-factor Authentication (M1032).lastpass.com directly into your browser or by using the official browser extension or mobile app. Do not rely on links in emails.The most effective mitigation is training users to recognize phishing attempts and to never share their master password.
Enabling MFA on LastPass accounts provides a critical layer of security against master password compromise.
Blocking the malicious domains and sender addresses at the network and email gateway level can prevent the attack from reaching users.
The single most effective technical defense against the LastPass phishing campaign is the universal enforcement of Multi-factor Authentication (MFA) on all LastPass accounts. Even if a user is tricked into entering their master password on the phishing site lastpassdesktop[.]com, the attacker cannot access the vault without the second factor (e.g., a code from an authenticator app, a hardware key, or a biometric prompt). Organizations should enforce this via LastPass enterprise policies, and individual users should enable it immediately in their account settings. This technique acts as a critical failsafe, neutralizing the primary goal of the credential harvesting attack.
To proactively block the LastPass phishing campaign, security teams should immediately implement DNS Denylisting for the known malicious domains. Add lastpassdesktop[.]com, lastpassdesktop[.]app, and the sender's domain lastpasspulse[.]blog to your organization's DNS sinkhole or secure DNS service (like Cisco Umbrella or Quad9). This will prevent any user who clicks the phishing link from ever reaching the malicious site, as the DNS request will be blocked. This is a highly effective, low-overhead method to neutralize the known infrastructure of this specific campaign and protect users who might otherwise fall for the scam.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats