Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

January 6, 2026

New Zealand Orders Review of Manage My Health Breach

January 5, 2026

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

January 5, 2026
Facebook X (Twitter) Instagram
Tuesday, January 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Experts Trace $35m in Stolen Crypto to LastPass Breach
News

Experts Trace $35m in Stolen Crypto to LastPass Breach

Team-CWDBy Team-CWDJanuary 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A major data breach at a leading password management provider in 2022 has enabled hackers to drain victims’ digital wallets of millions in crypto, according to TRM Labs.

The blockchain analytics company said it traced several waves of cryptocurrency theft in the months and years following the LastPass breach, attributing the efforts to Russian cybercriminals.

Backups of around 30 million customer password vaults were exposed in the incident, creating what TRM Labs described as a “long-tail risk” for more than 25 million users.

“Any vault protected by a weak master password could eventually be decrypted offline, turning a single 2022 intrusion into a multi-year window for attackers to quietly crack passwords and drain assets over time,” it warned.

Read more on LastPass breach: LastPass Hackers Stole Source Code

Although it admitted this was likely “only a fraction” of the full amount stolen, TRM claimed to have traced $28m stolen from 2024 to early 2025, and then a further $7m taken in September 2025.

Both phases converged on Russian cryptocurrency exchanges and infrastructure.

“In an earlier phase following the initial exploitation, stolen funds were routed through the now defunct Cryptomixer.io and off-ramped via Cryptex, a Russia-based exchange sanctioned by OFAC in 2024,” TRM explained.

“In a subsequent wave identified in September 2025, TRM analysts traced approximately $7m in additional stolen funds through Wasabi Wallet, with withdrawals ultimately flowing to Audi6, another Russian exchange associated with cybercriminal activity.”

Funds were being converted to fiat currency and withdrawn via the exchange as recently as October 2025, the firm added.

Although the actors responsible used anonymization service CoinJoin to obfuscate the money trail, TRM was able to pick up the scent using demixing.

“Using proprietary demixing techniques, analysts matched the hackers’ deposits to a specific withdrawal cluster whose aggregate value and timing closely aligned with the inflows, an alignment statistically unlikely to be coincidental,” it said.

“Blockchain fingerprints observed prior to mixing, combined with intelligence associated with wallets after the mixing process, consistently pointed to Russia-based operational control.”

Lessons Learned

For digital wallet users, the incident is another reminder of the need for multi-factor authentication (MFA) and swift action following any potential password compromise.

“Slow-drip wallet draining” over the past three years was enabled by brute-forcing of password vaults, because LastPass users failed to change their master passwords.

The incident also underscores the persistent threats posed by Russian cybercrime actors.

In December 2025, LastPass was fined £1.2m ($1.6m) by the UK’s Information Commissioner’s Office (ICO) for security failings that led to the breach, which impacted an estimated 1.6 million UK users.

At the time, the regulator said that master passwords were stored locally on customer devices, limiting the potential for threat actors to decrypt customer credentials.

Image credit: Maor_Winetrob / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
Next Article European Space Agency Confirms Server Breach
Team-CWD
  • Website

Related Posts

News

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

January 6, 2026
News

New Zealand Orders Review of Manage My Health Breach

January 5, 2026
News

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

January 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

How chatbots can help spread scams

October 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.