If you use LastPass, check your inbox. A sophisticated phishing campaign that started on January 19, 2026 is targeting LastPass customers with fake "backup your vault" emails designed to steal your master password.
Here's how to identify the fake emails, what to do if you clicked, and how to protect your accounts going forward.
What the phishing emails look like
The fake emails are designed to create urgency. According to Malwarebytes, the scam emails:
Claim LastPass is performing "scheduled maintenance"
Warn that you'll lose access to your vault if you don't act within 24 hours
Ask you to "create a local backup" of your passwords
Include a link to a fake LastPass login page
The key red flag: LastPass has confirmed they are NOT asking customers to backup their vaults. Any email claiming otherwise is fraudulent.
How to tell if an email is fake
Check these elements before clicking anything:
Sender address
Real LastPass emails come from @lastpass.com domains. The phishing emails come from lookalike domains or compromised email accounts.
Urgency tactics
Legitimate companies don't threaten account deletion within 24 hours. This artificial urgency is a classic phishing technique designed to make you act before you think.
The link destination
Hover over any link (don't click). Real LastPass links go to lastpass.com. The phishing links redirect to fake sites designed to capture your master password.
Grammar and formatting
While these particular phishing emails are well-crafted, look for subtle inconsistencies in formatting, spacing, or language that differ from typical LastPass communications.
What to do if you received the email
If you didn't click
Delete the email - Don't click any links or download any attachments
Report it - Forward the email to
abuse@lastpass.combefore deletingStay alert - The campaign is ongoing, so you may receive more attempts
If you clicked but didn't enter your password
Close the tab immediately - Don't enter any information
Clear your browser cache - Some phishing sites install tracking cookies
Run a malware scan - Just in case
If you entered your master password
This is a critical situation. Your entire password vault may be compromised.
Change your LastPass master password immediately - Use a completely new, unique password
Enable two-factor authentication if you haven't already
Change passwords for your most critical accounts:
- Email (this is your recovery method for everything else)
- Banking and financial accounts
- Work/business accounts
- Social media
Check for unauthorized access - Review LastPass's security dashboard for unusual login locations or devices
Consider migrating - After two major breaches and now targeted phishing, many security experts recommend moving to a different password manager
Why LastPass keeps getting targeted
This isn't LastPass's first security crisis. The company suffered a major breach in 2022 that exposed encrypted password vaults for millions of users. That breach has led to:
Ongoing cryptocurrency theft - TRM Labs traced $35 million in stolen crypto directly to decrypted LastPass vaults
A £1.2 million fine from the UK's ICO - Regulators found LastPass failed to implement adequate security measures
Continued targeting - Attackers know LastPass users have valuable credential data
The 2022 breach was caused by an employee's compromised home computer, which allowed attackers to access development systems and eventually steal encrypted vault data. While the vaults were encrypted, weak master passwords have allowed attackers to decrypt them over time.
How to migrate away from LastPass
If you've decided to switch password managers, here's how to export your data:
Log into LastPass via a desktop browser (not the mobile app)
Go to Account Settings → Advanced Options
Select "Export" under Manage Your Vault
Enter your master password to confirm
Save the CSV file to your computer
Import into your new password manager - Most managers (1Password, Bitwarden, etc.) have a LastPass import option
Important: Your exported CSV file contains all your passwords in plain text. Delete it securely after importing, and never email it or store it in cloud storage.
The bigger problem: Password rotation
Whether you stay with LastPass or migrate, you still face the same challenge: you probably need to change dozens of passwords.
After any breach or phishing incident, security experts recommend changing passwords for:
- Any account that used a compromised password
- Any account with password reuse
- All high-value accounts (email, banking, work)
Doing this manually takes hours. Most people start strong, change 5-10 passwords, and then give up—leaving themselves vulnerable.
Automate your password rotation
This is exactly the problem we built Dosel to solve. Instead of manually logging into 50+ websites and clicking through password change flows, our AI agent does it for you:
Import your passwords from any manager (including LastPass)
Select which accounts to update - prioritize critical accounts first
Let the AI handle it - our browser automation navigates each site and changes passwords automatically
Export your new credentials - import them back into your password manager of choice
The entire process runs locally on your Mac. Your passwords never leave your machine and never touch our servers.
Download Dosel → — 5 free automated password changes per month.
Frequently asked questions
Is LastPass safe to use anymore?
That depends on your risk tolerance. LastPass has suffered multiple security incidents, and the 2022 breach is still causing problems years later. Many security professionals have migrated away. If you stay, ensure you have a strong, unique master password and two-factor authentication enabled.
What password manager should I switch to?
For most users, we recommend Bitwarden (free, open-source, zero-knowledge) or 1Password (premium features, excellent security). Both have proven track records and haven't suffered comparable breaches. See our full comparison guide.
How do I know if my vault was compromised in the 2022 breach?
If you had a LastPass account before December 2022, your encrypted vault data was likely stolen. The risk depends on your master password strength. If it was weak or reused, your vault may have already been decrypted.
Should I change all my passwords?
After a phishing attempt where you entered credentials, yes—at minimum change passwords for critical accounts. If you suspect broader compromise, change everything. This is where automation helps: manually changing 100+ passwords takes hours, but with Dosel, it takes minutes per account.
Stay protected
The LastPass phishing campaign is a reminder that password security requires ongoing vigilance. Whether you stay with LastPass or migrate:
Use a strong, unique master password - at least 16 characters
Enable two-factor authentication everywhere
Don't reuse passwords across accounts
Rotate passwords regularly - especially after breaches
Stay skeptical of urgent emails - legitimate companies don't threaten 24-hour deadlines
If you need to rotate passwords quickly, Dosel can help you update dozens of accounts in a fraction of the time it would take manually.
Download Dosel → — Free for Mac, 5 automated password changes per month.