Major data breach — encrypted vaults stolen
Attackers stole encrypted password vaults and unencrypted metadata for millions of users. Weak master passwords remain at risk of brute-force decryption.
View source →Follow-up breach via developer machine
Attackers exploited a compromised developer's home computer to steal decryption keys for cloud storage backups containing vault data from the 2022 breach.
View source →This extension shows critical risk indicators. It requests highly sensitive permissions combined with suspicious code patterns. Proceed with extreme caution.
Based on 19 permissions including high-risk ones, 144 code findings, 3 dangerous combinations.
Extension tracks open tabs and communicates with external servers — potential browsing surveillance.
Extension intercepts network traffic and sends data externally — potential man-in-the-middle behavior.
Extension has access to all sites and captures keyboard input — behavior consistent with a keylogger.
3 libraries detected
object-src is not set to 'none'. Plugins like Flash can be embedded, which may allow code execution.
Resolved from __MSG_* i18n placeholders:
Description: LastPass is an award-winning password manager for secure credential management on any device.
JavaScript files are exposed as web-accessible resources. Matched websites can load and interact with extension scripts.
136 indicators of compromise found