{"id":15171,"date":"2026-01-03T11:10:33","date_gmt":"2026-01-03T18:10:33","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=15171"},"modified":"2026-01-03T11:10:33","modified_gmt":"2026-01-03T18:10:33","slug":"cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/01\/03\/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach\/","title":{"rendered":"Cryptocurrency Theft Attacks Traced to 2022 LastPass Breach"},"content":{"rendered":"\n<p>This was well publicized, so at the time not only did I change my master password, but also the password for any financial or critical site. Consequently, <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/11\/08\/is-your-password-manager-owned-by-a-surveillance-company-lastpass\/\" target=\"_blank\" rel=\"noreferrer noopener\">LastPass doesn&#8217;t have a great reputation for security<\/a> even though a Google researcher found and helped fix several bugs. You&#8217;re best to use something else like Bitwarden or Keepass, both of which you can host yourself. Bitwarden has opensource apps, undergoes regular security testings, and only $10 a year if you want second factor authentication.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/cry<\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">p<\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach\/\">tocurrency-theft-attacks-traced-to-2022-lastpass-breach\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_3fd91ba0-ff67-49e7-afff-6781d403f6f7\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Lawrence Abrams<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/12\/31\/lastpass-empty-vaults.jpg\" alt=\"LastPass theft\"\/><\/figure>\n\n\n\n<p>Blockchain investigation firm TRM Labs says ongoing cryptocurrency thefts have been traced to the 2022 LastPass breach, with attackers draining wallets years after encrypted vaults were&nbsp;stolen and laundering the crypto through Russian exchanges.<\/p>\n\n\n\n<p>In 2022, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lastpass-developer-systems-hacked-to-steal-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">LastPass disclosed<\/a> that attackers breached its systems by compromising a developer environment, stealing portions of the company&#8217;s source code and proprietary technical information.<\/p>\n\n\n\n<p>In a later, but related&nbsp;security incident, the hackers&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/goto-says-hackers-breached-its-dev-environment-cloud-storage\/\" target=\"_blank\" rel=\"noreferrer noopener\">breached the cloud storage firm GoTo<\/a>&nbsp;using previously stolen credentials and&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lastpass-says-hackers-accessed-customer-data-in-new-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">stole&nbsp;LastPass database backups<\/a> stored on the platform. For some customers, these encrypted password vaults not only contained credentials,&nbsp;but <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lastpass-breach-linked-to-theft-of-44-million-in-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">also&nbsp;cryptocurrency wallet private keys and seed phrases<\/a>.<\/p>\n\n\n\n<p>While the vaults were encrypted, users with weak or reused master passwords were vulnerable to offline cracking, which is believed to have been ongoing since the breach.<\/p>\n\n\n\n<p>&#8220;Depending on the length and complexity of your master password and iteration count setting, you may want to reset your master password,&#8221; <a href=\"http:\/\/support.lastpass.com\/s\/document-item?language=en_US&amp;bundleId=lastpass&amp;topicId=LastPass\/security-bulletin-recommended-actions-free-premium-families.html&amp;_LANG=enus\" target=\"_blank\" rel=\"noreferrer noopener\">warned LastPass<\/a> when they disclosed the breach.<\/p>\n\n\n\n<p>The link between the LastPass breaches and crypto thefts was further corroborated by the U.S. Secret Service, which in 2025 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">seized more than $23 million in cryptocurrency<\/a> and said attackers had obtained victims&#8217; private keys by decrypting vault data stolen in a password manager breach.&nbsp;<\/p>\n\n\n\n<p>In <a href=\"http:\/\/legacy.www.documentcloud.org\/documents\/25555236-merged_42402_-1-1741359918\" target=\"_blank\" rel=\"noreferrer noopener\">court filings<\/a>, agents said there was no evidence the victims&#8217; devices had been compromised through phishing or malware, and that they believed the theft was linked to the stolen password vaults.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Crypto thefts linked to LastPass breach<\/h2>\n\n\n\n<p>In <a href=\"https:\/\/www.trmlabs.com\/resources\/blog\/trm-traces-stolen-crypto-from-2022-lastpass-breach-on-chain-indicators-suggest-russian-cybercriminal-involvement\" target=\"_blank\" rel=\"noreferrer noopener\">a report<\/a> published last week, TRM said that ongoing cryptocurrency theft attacks have been traced to the abuse of the encrypted LastPass password vaults stolen in 2022.<\/p>\n\n\n\n<p>Rather than the wallet being drained&nbsp;immediately after a breach, the thefts were in waves months or years later, illustrating how the attackers gradually decrypting vaults and extracting stored credentials.<\/p>\n\n\n\n<p>The affected wallets were drained using similar transactions methods, with no reports of a new attack, indicating the attacker possessed the private keys before the thefts.<\/p>\n\n\n\n<p>&#8220;The linkage in the report is not based on direct attribution to individual LastPass accounts, but on correlating downstream on-chain activity with the known impact pattern of the 2022 breach,&#8221; TRM told BleepingComputer.<\/p>\n\n\n\n<p>&#8220;That created a scenario in which wallet drains would occur well after the original breach, rather than immediately, and in distinct waves.&#8221;<\/p>\n\n\n\n<p>TRM told BleepingComputer its investigation was initially based on a small number of reports, including submissions to Chainabuse, in which users identified the LastPass breach as the method their wallets were stolen.<\/p>\n\n\n\n<p>Researchers expanded their investigation by identifying cryptocurrency transaction behavior across other cases, linking the thefts to the LastPass data theft campaign.<\/p>\n\n\n\n<p>TRM told BleepingComputer that the most significant part of their research was the ability to trace stolen funds even after they were mixed using Wasabi Wallet&#8217;s CoinJoin feature.<\/p>\n\n\n\n<p>CoinJoin is a Bitcoin privacy technique that combines transactions from multiple users into a single transaction, making it more challenging to determine which inputs correspond to which outputs.<\/p>\n\n\n\n<p>Wasabi Wallet includes CoinJoin as a built-in feature, allowing users to automatically mix their Bitcoin with others to obfuscate&nbsp;transactions without relying on a mixing service.<\/p>\n\n\n\n<p>After draining wallets, attackers converted stolen crypto to Bitcoin, routed them through Wasabi Wallet, and attempted to hide their tracks using CoinJoin transactions.<\/p>\n\n\n\n<p>However, TRM says it was able to &#8220;demix&#8221; the cryptocurrency sent via CoinJoin transactions by analyzing behavioral characteristics, such as transaction structure, timing, and wallet configuration choices.<\/p>\n\n\n\n<p>&#8220;Rather than attempting to demix individual thefts in isolation, TRM analysts analyzed the activity as a coordinated campaign, identifying clusters of Wasabi deposits and withdrawals over time. Using proprietary demixing techniques, analysts matched the hackers\u2019 deposits to a specific withdrawal cluster whose aggregate value and timing closely aligned with the inflows, an alignment statistically unlikely to be coincidental.<\/p>\n\n\n\n<p>Blockchain fingerprints observed prior to mixing, combined with intelligence associated with wallets after the mixing process, consistently pointed to Russia-based operational control. The continuity across pre-mix and post-mix stages strengthens confidence that the laundering activity was conducted by actors operating within, or closely tied to, the Russian cybercrime ecosystem.&#8221; \u2756 TRM Labs<\/p>\n\n\n\n<p>By treating the thefts as a coordinated campaign rather than individual&nbsp;compromises, TRM was able to match groups of Wasabi deposits with withdrawal patterns that matched the crypto theft attacks via the LastPass breach.<\/p>\n\n\n\n<p>Early withdrawals after the wallet drains further indicate the same threat actors who stole the funds were behind the mixing activity.<\/p>\n\n\n\n<p>Using this technique, TRM estimates that more than $28 million in cryptocurrency was stolen and laundered through Wasabi Wallet in late 2024 and early 2025. An additional $7 million was tied to a later wave of attacks in September 2025.&nbsp;<\/p>\n\n\n\n<p>TRM says the funds were repeatedly cashed out via the same Russian-linked exchanges, including Cryptex and Audi6, further indicating that the same threat actors were behind these&nbsp;breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This was well publicized, so at the time not only did I change my master password, but also the password for any financial or critical site. Consequently, LastPass doesn&#8217;t have a great reputation for security even though a Google researcher found and helped fix several bugs. You&#8217;re best to use something else like Bitwarden or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-15171","post","type-post","status-publish","format-standard","hentry","category-tech","category-world"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=15171"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15171\/revisions"}],"predecessor-version":[{"id":15172,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/15171\/revisions\/15172"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=15171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=15171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=15171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}