Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SpaceX Postpones 2026 Mars Mission Citing Strategic Distraction

    January 12, 2026

    Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

    January 12, 2026

    Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

    January 12, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

      January 12, 2026

      Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

      January 12, 2026

      Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

      January 12, 2026

      AI Adoption Leaders Pull Ahead, Leaving Others Behind

      January 11, 2026

      Elon Musk’s xAI Secures $20 Billion Funding to Power AI Expansion

      January 11, 2026
    • AI News
    TallwireTallwire
    Home»Cybersecurity»Historic LastPass Breach Still Fueling Years-Long Cryptocurrency Thefts
    Cybersecurity

    Historic LastPass Breach Still Fueling Years-Long Cryptocurrency Thefts

    3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Recent investigation reports confirm that encrypted password vaults stolen in the 2022 LastPass data breach continue to be cracked by threat actors, enabling ongoing cryptocurrency theft through 2025 and potentially into 2026, with millions in digital assets siphoned off and laundered via mixing services and high-risk exchanges. Blockchain intelligence firm TRM Labs traced patterns of wallet drains linked to the compromised vaults, identifying at least $28–$35 million stolen and laundered through Russian-associated channels; historical links also tie the breach to larger crypto heists in the hundreds of millions. Despite LastPass’s encryption and mitigation efforts, weak master passwords and offline cracking have allowed attackers to extract private keys and seed phrases from vault backups years after the original incident, underscoring long-tail cybersecurity risks tied to major data breaches.

    Sources:

    https://www.techradar.com/pro/security/historic-lastpass-breach-enabling-cryptocurrency-theft-investigation-reveals
    https://cyberpress.org/35-million-cryptocurrency-theft/
    https://www.bleepingcomputer.com/news/security/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach/

    Key Takeaways
    • The 2022 LastPass breach has ongoing impacts years later, with stolen encrypted vaults being cracked to steal crypto assets.
    • Blockchain analysis links tens of millions of dollars in theft to identifiable patterns tied to the stolen vault data.
    • Weak master passwords and offline decryption efforts continue to expose users to risk long after a breach is disclosed.
    In-Depth

    The cybersecurity fallout from the LastPass 2022 data breach isn’t just history — it’s an ongoing, evolving threat. What many initially thought was a contained incident has morphed into a multi-year saga where threat actors continue to leverage stolen encrypted password vaults to access and drain cryptocurrency wallets. According to recent reports, the encryption on the vaults was only as strong as the master passwords protecting them. When users chose weak or reused passwords, attackers were able to crack those vaults offline and retrieve sensitive seed phrases and private keys, granting full access to their digital assets.

    Blockchain intelligence firm TRM Labs has been tracking the aftermath closely. Their analysis reveals consistent transaction patterns across multiple wallet drains, indicating that stolen crypto was converted and laundered through mixing services and routed into high-risk exchanges, often linked to Russia. Through these methods, at least $28 to $35 million has been tied back to the stolen vault data in late 2024 and 2025. Traditional reporting also cites earlier waves of theft that, when combined with related activity, suggest the total impact could be much larger.

    This situation underscores how a breach’s consequences can stretch far beyond its initial disclosure. Organizations and individuals alike must recognize that robust password hygiene isn’t just best practice — it’s a frontline defense against years-long exploitation when breaches occur. Users with vaults affected in 2022 should assume exposure and take comprehensive steps to secure any remaining accounts.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleChinese Cyber Onslaught on Taiwan’s Vital Networks Surges to 2.6M Daily Attacks in 2025
    Next Article China’s EV Battery National Standards Set Stage for Solid-State Dominance

    Related Posts

    California Lawmaker Pushes Four-Year Ban on AI Chatbot Toys, Citing Child Safety Risks

    January 12, 2026

    Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

    January 12, 2026

    Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

    January 12, 2026

    Founder of U.S. Spyware Maker pcTattletale Pleads Guilty in Federal Court

    January 12, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Wearable Health Tech Could Create Over 1 Million Tons of E-Waste by 2050

    January 12, 2026

    Viral Reddit Food Delivery Fraud Claim Debunked as AI Hoax

    January 12, 2026

    Activist Erases Three White Supremacist Websites onstage at German Cybersecurity Conference

    January 12, 2026

    AI Adoption Leaders Pull Ahead, Leaving Others Behind

    January 11, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.