Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

LastPass Crypto Theft: The Ongoing Consequences of a 2022 Breach


Stolen LastPass backups enable crypto theft through 2025 due to weak master passwords, according to recent findings by TRM Labs. This breach has significant implications for users and highlights the ongoing threat of cybercrime in the cryptocurrency space.

  • Stolen LastPass backups are still being cracked using weak master passwords until 2025.
  • Russian cybercrime infrastructure continues to monetize the breach, with coordinated activity linked to Russia-based operators.
  • The diminishing effectiveness of mixing as a means of obfuscation highlights the need for international cooperation to combat cybercrime.
  • Users are advised to use strong master passwords, enable two-factor authentication, and keep software up-to-date to protect their cryptocurrency and password managers.



  • Stolen LastPass backups enable crypto theft through 2025, according to recent findings by TRM Labs. This revelation highlights the ongoing impact of the 2022 breach that affected LastPass, a popular password manager, and the continued exploitation of its encrypted vault backups.

    The 2022 breach was one of the most significant in recent memory, with hackers stealing encrypted backups of roughly 30 million vaults containing sensitive credentials, including crypto keys. The breach exposed users to a multi-year risk, as attackers could decrypt vaults using weak master passwords.

    TRM Labs has been tracking the aftermath of the breach and found that the stolen vault backups were still being cracked using weak master passwords, enabling crypto theft as late as 2025. This means that even years after the initial breach, users are still at risk of having their cryptocurrency stolen due to weak password choices.

    The TRM report highlights the continued involvement of Russian cybercrime infrastructure in monetizing the breach. Analysts identified consistent on-chain patterns, SegWit, Replace-by-Fee, single-use addresses, and coordinated deposit/withdrawal clusters linking activity to Russia-based operators. The findings suggest that Russian exchanges like Cryptex and Audi6 were used as critical off-ramps for laundered funds.

    Furthermore, TRM Labs noted the diminishing effectiveness of mixing as a reliable means of obfuscation. As law enforcement pressure increases, attackers are resorting to other methods to disguise their tracks. The report concludes that Russian high-risk exchanges and laundering services have repeatedly served as critical off-ramps for globally dispersed ransomware groups, sanctions evaders, and other cybercriminal networks.

    The significance of likely Russian involvement extends beyond this single case. The role of Russia-based financial infrastructure in enabling global cybercrime underscores the need for international cooperation to combat cybercrime effectively. As enforcement pressure increases elsewhere, it is essential that law enforcement agencies and cybersecurity professionals work together to disrupt these networks and prevent further exploitation.

    In light of these findings, users are advised to take immediate action to protect their cryptocurrency and password managers. This includes using strong master passwords, enabling two-factor authentication, and keeping software up-to-date with the latest security patches. By taking proactive steps to secure their digital assets, individuals can reduce their risk of falling victim to cybercrime.

    The ongoing threat landscape highlights the importance of cybersecurity awareness and education. As technology continues to evolve, so too do the methods used by attackers. It is crucial that users remain vigilant and take steps to protect themselves from emerging threats. By working together, we can create a safer digital environment for everyone.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/LastPass-Crypto-Theft-The-Ongoing-Consequences-of-a-2022-Breach-ehn.shtml

  • https://securityaffairs.com/186191/digital-id/stolen-lastpass-backups-enable-crypto-theft-through-2025.html


  • Published: Sun Dec 28 06:59:40 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us