FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Scammers Take Advantage of LastPass Legacy Recovery

Gregory Zuckerman
Last updated: October 26, 2025 11:08 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

Cybercrooks have been impersonating LastPass’s “after-death” Emergency Access workflow to get their hands on the master passwords of individuals susceptible to this type of attack, using both plausible emails and persuasive live phone calls to direct victims toward a phishing site that emulates an actual recovery page.

What Attackers Are Exploiting in Emergency Access

LastPass, among other password managers, allows users to designate trusted contacts who can request access to their vault after a loved one has passed or in an emergency situation. The process is supposed to be predictable: A request sets an email in motion to the account holder, a waiting period commences, and access is formally given if the request isn’t denied within that time. It is that predictable flow that scammers are mimicking.

Table of Contents
  • What Attackers Are Exploiting in Emergency Access
  • How the Phishing Lure Works to Steal Master Passwords
  • What LastPass and Researchers Are Saying
  • The Broader Phishing Context and Industry Trends
  • How to Protect Your Vault Now from Recovery Scams
LastPass logo with phishing hook highlighting legacy recovery scam

Phishers are mailing out fake “legacy request” notices that resemble real service messages. Part of the goal is psychological as well as technical: Few alerts feel more urgent than someone trying to capture your digital estate. That urgency contributes to impulsive clicks.

How the Phishing Lure Works to Steal Master Passwords

Victims say they are receiving emails that allege a trusted contact has begun the process of taking over their legacy. The message also contains a call-to-action button leading to a domain like lastpassrecovery[.]com, a pixel-accurate reproduction that prompts the user to enter their master password. In other cases, scammers have apparently even followed up over the phone, masquerading as LastPass staff to “confirm” the alert and usher victims into typing their credentials at the mock site — classic vishing plus phishing fitting together like two pieces of a jigsaw.

The campaign was discovered in mid-October, a BleepingComputer report noted, and researchers have connected its infrastructure and tradecraft to CryptoChameleon, an entity involved with high-end phishing kits and earlier impersonation campaigns targeting U.S. government workers. The playbook includes the use of lookalike domains, search-optimized decoy pages, and orchestrated phone calls.

What LastPass and Researchers Are Saying

LastPass has said that it would never ask a customer to reveal a master password in an email nor over the phone. Should you get a legacy request notification, the best way to verify it is to open your LastPass app or go directly to the service’s site by entering its URL, and then verify Emergency Access through your account settings — never using an emailed link from within the notification of an inheritance assignment.

Imitators have taken aim at the brand often, and high-profile episodes have put it in their crosshairs.

Some hackers stole encrypted customer vault backups during a 2022 attack — data that they can’t get into unless they know the master password. That history goes some way toward explaining why social engineering is in vogue, and why, if criminals can’t break encryption, they will aim to get people to hand over the keys.

The Broader Phishing Context and Industry Trends

Type of attack: Brand impersonation and “account recovery” spoofs are on the rise across the industry. The FBI’s Internet Crime Complaint Center registered $12.5B in overall cybercrime losses in its latest annual accounting (phishing was again the most common crime category by volume). Similarly, the Anti-Phishing Working Group has reported historically high levels of phishing in 2023 with millions of attacks per month.

A screenshot of the LastPass Setup Emergency Access screen, showing a dropdown menu for Wait Time with Immediately selected. The background has been changed to a professional flat design with soft patterns.

There are two trends that make the recovery-lure scams so effective: One, culprits can leverage legitimate workflows users expect to see; and two, they can add a ticking clock, time-sensitive urgency.

A realistic waiting period engenders a genuine sense of urgency, and sometimes that’s all it takes to overcome a healthy skepticism.

How to Protect Your Vault Now from Recovery Scams

Bypass email links entirely. If you receive one of these legacy or recovery alerts, open LastPass directly from the browser extension or mobile app and verify Emergency Access status by going to your account settings. If an in-app request isn’t pending, the email is a scam.

Harden authentication. Use multifactor authentication for your vault, with a preference for phishing-resistant options including FIDO2 security keys where available. Biometrics via a company-issued authenticator app can also minimize dependence on transmittable codes.

Scrutinize domains and caller claims. Search for subtle misspellings, extra words, or strange top-level domains. For calls, hang up and reach out to support via the official app or published avenues; never read one-time codes or divulge master passwords over the phone.

Tighten Emergency Access. Go over who you have designated, verify contact information, and perhaps institute a longer waiting period to issue the request in order to provide yourself with more time to rebuff possible fraudulent requests when an alert lands in your inbox.

Report and contain.

  • Report suspicious emails to your mail provider’s abuse team.
  • Report the site to trusted security groups such as APWG.
  • Alert LastPass support so they can take down domains more quickly.

“The bottom line: they can make the page look beautiful, but it’s the journey you are sent down,” he said. Consider any recovery or legacy alert as a cue to go verify inside your vault — rather than typing in your master password on a page you didn’t manually visit.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Chrome for iOS and Android Gets a Shortcut Button for AI Mode
TikTok Robot Rizzbot Flips Off a Reporter
Normally $100, Subscription-Free PDF Editor Drops to $25
BlaBlaCar Positions India as Largest Market
Bug in Google’s Titan may prevent 911 emergency calls
AWS re:Invent Level 3 outage knocks out smart beds
Galaxy XR Is Going To Be Grounded On Apple Vision Pro
AppContext To Keep Apps Alive In Android
New Research Highlights AI Browser Agent Security Gaps
Retro Console Power Bank Available on a $49 Price Cut
Ryzen 9 9950X3D Outpaces Core Ultra 9 285K in Gaming
Eufy C220 over Nest Cam in a smarter budget buy
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.