Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/CyberSecurity News/LastPass Data Breach Led to $35 Cryptocurrency Theft
CyberSecurity News

LastPass Data Breach Led to $35 Cryptocurrency Theft

Over $35 million in cryptocurrency, stolen during the 2022 LastPass breach, has been traced by blockchain intelligence firm TRM Labs. The firm’s findings expose a sophisticated Russian...

Emy Elsamnoudy
Emy Elsamnoudy
January 6, 2026 2 Min Read
8 0

Over $35 million in cryptocurrency, stolen during the 2022 LastPass breach, has been traced by blockchain intelligence firm TRM Labs. The firm’s findings expose a sophisticated Russian cybercriminal laundering operation, active into 2025.

In 2022, hackers breached LastPass and stole encrypted password vaults containing the credentials of roughly 30 million users worldwide.

Although the vaults were encrypted, attackers downloaded them in bulk and began cracking weak master passwords offline.

This allowed cybercriminals to access private keys and seed phrases stored inside, leading to continuous wallet drains throughout 2024 and 2025, more than three years after the initial breach.

TRM Labs estimates that over $28 million was stolen, converted to Bitcoin, and laundered through Wasabi Wallet, a privacy-focused mixing service.

The most recent LastPass-linked transactions occurred as late as October 2025, with an additional $7 million traced in September.

Demixing Exposes Russian Infrastructure

Using advanced demixing techniques, TRM analysts defeated the privacy protections of CoinJoin mixers like Wasabi Wallet by identifying behavioral patterns and transaction fingerprints.

The analysis revealed that stolen funds consistently flowed to the Russian exchanges Cryptex and Audi6, both of which are associated with cybercriminal money laundering.

Intelligence linked to wallets both before and after mixing pointed to Russia-based operational control, indicating continuity across multiple laundering phases rather than isolated activity.

Cryptex was sanctioned by OFAC in 2024 for facilitating ransomware payments. This case demonstrates that cryptocurrency mixers do not eliminate attribution risk when threat actors rely on consistent infrastructure.

TRM’s demixing methodology revealed clustered withdrawal patterns and peeling chains that funneled mixed Bitcoin to known Russian exchanges, showing the operational architecture of the laundering pipeline.

For the 25 million affected LastPass users who failed to rotate passwords or secure their vaults, the threat remains active, a stark reminder that credential breaches can create multi-year windows of exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitHackerransomwareThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

GravityRAT Remote Access Malware Attacks Windows, Android, macOS

Next Post

Hackers Breached Companies via Leaked Cloud Cred Threat Actors

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us