Skip to main content

TRM Labs report: The 2022 LastPass breach is still being exploited in late 2025, with more than $35M in crypto traced to related thefts.

LastPass 2022 Breach Still Fueling Crypto Thefts in 2025, TRM Labs Report Finds
Cybersecurity • Wallet Safety • Crypto Crime

LastPass 2022 Breach Still Fueling Crypto Thefts in 2025, TRM Labs Report Finds

A new analysis warns the LastPass breach wasn’t a one-time headline — it became a long-running pipeline for wallet drains, with traced losses now exceeding $35 million.
Cybersecurity-themed hero image representing password vault breaches and cryptocurrency wallet theft

The crypto industry often treats breaches as isolated events: a hack happens, a headline hits, and the news cycle moves on. But a recent report by TRM Labs highlights a more uncomfortable reality: some compromises create a multi-year threat window — especially when stolen data can be used later to access self-custody wallets.

According to the report, the 2022 LastPass data breach has been linked to prolonged cryptocurrency thefts, with attackers using stolen vault data to drain assets as recently as late 2025. TRM Labs says the total traced amount of stolen crypto connected to the breach is now over $35 million.

Big takeaway: A password manager breach can become a delayed “wallet drain” event — because encrypted vaults can be cracked later, and once seed phrases or private keys are exposed, crypto theft can be irreversible.

What TRM Labs Says Happened

TRM Labs’ analysis focuses on the long-tail exploitation of compromised vault data. The key point is that attackers don’t always need immediate access to your accounts the day a breach is revealed. Instead, they can:

  • store encrypted vaults and attempt to decrypt them over time,
  • target high-value victims selectively (crypto holders, founders, traders),
  • use recovered secrets (seed phrases, private keys, exchange credentials) to drain assets later,
  • move funds across chains and services to reduce traceability.

This helps explain why the thefts tied to the breach appear to continue: the attacker’s “work” can happen quietly and gradually, with new decryption successes unlocking new victims.

Why Vault Data Is So Dangerous for Crypto Users

Many crypto users rely on password managers for convenience and security — storing exchange passwords, API keys, 2FA backup codes, and sometimes even “critical secrets” like recovery phrases. The risk is straightforward: if a seed phrase or private key ends up exposed, it can grant full control of a wallet.

Seed phrases are not like passwords

If your email password is stolen, you can reset it. If your wallet seed phrase is stolen, there is no “reset” button. The only effective response is to move funds to a new wallet created from a fresh seed phrase — ideally generated offline.

Rule of thumb: Treat seed phrases like physical gold bars — you don’t store them in a cloud note or a screenshot. The more copies that exist, the higher the risk.

A Simple Timeline of the Long-Tail Threat

2022 LastPass breach disclosed; data including vault information is exposed.

2023–2024 Attackers continue decrypting and exploiting recovered vault contents.

2025 TRM Labs links ongoing wallet drains to the breach; activity continues into late 2025.

Now Victims face the same harsh reality: once funds move, recovery becomes difficult and often impossible.

How Wallet Drains Usually Play Out

Crypto theft linked to compromised secrets often follows a predictable pattern:

  • Account discovery: attacker identifies a wallet address or exchange account tied to the victim.
  • Access step: attacker uses recovered credentials or seed phrase to sign transactions.
  • Fast exit: funds are moved quickly into new addresses, sometimes bridged across chains.
  • Obfuscation: funds may pass through mixers, swap routes, or high-liquidity tokens.

The speed matters. Once funds leave your wallet, the attacker can split them and scatter them across networks — making recovery far harder even when tracking is possible.

The Victim Impact: What Gets Lost (Beyond Money)

Large crypto theft numbers can feel abstract, but behind each drained wallet is a person or business that trusted their setup. In real cases, victims often report:

  • Loss of long-term holdings (BTC, ETH, blue-chip positions) accumulated over years.
  • Destroyed confidence in self-custody and digital security.
  • Operational disruption for teams (treasury drains, payroll risk, paused launches).
  • Stigma and silence: many avoid reporting due to embarrassment or fear.
Important: Victims of cybercrime are not “bad at crypto.” Most incidents happen because security is a system — and attackers only need one weak link.

What To Do If You Used a Password Manager for Crypto Secrets

If you stored seed phrases, private keys, or exchange API keys in any digital vault, the safest response is to assume the information could eventually be exposed.

Priority actions (practical and fast)

  • Move funds from any wallet whose seed phrase may have been stored digitally to a new wallet.
  • Rotate exchange passwords and enable strong 2FA (hardware keys where possible).
  • Revoke API keys and issue new ones with minimal permissions.
  • Audit approvals on EVM wallets (token allowances) and revoke suspicious approvals.
  • Use hardware wallets for significant holdings and keep seed phrases offline.

Why This Story Matters for 2026 and Beyond

The LastPass-linked thefts are a reminder that crypto security isn’t only about blockchains. It’s also about: password hygiene, device security, backup code storage, and “where secrets live.” As crypto adoption expands through ETFs, banks, and mainstream apps, attackers are also evolving — increasingly targeting the off-chain components that control on-chain wealth.

Final quote: “In crypto, the hack isn’t always the blockchain — it’s the place you stored the key to your blockchain.”

This article is for informational purposes only and does not constitute legal, cybersecurity, or investment advice. If you believe you are a victim, consider documenting evidence and contacting qualified professionals or local authorities.

Comments

Popular posts from this blog

Create a Payza Account in Minutes: Step-by-Step Guide (Availability May Vary) Create a Payza Account in Minutes: Step-by-Step Guide Follow these quick steps to create, verify, and secure your Payza e-wallet. Note: Service availability and features can change—verify on the official site first. Signing up takes a few minutes—verification and security settings keep your wallet safer. Key takeaways Fast signup: Create an account with a valid email, then confirm and complete your profile. Verify early: Prepare ID + proof of address to unlock higher limits and withdrawals. Secure it: Enable 2FA, set strong passwords, and review notification settings. Contents Create Your Account Complete KYC Verification Harden Security (Highly R...
FTX/Alameda Wrapped Tokens on Solana Are No Longer Redeemable: What It Means for soBTC & soETH FTX/Alameda Wrapped Tokens on Solana Are No Longer Redeemable: What It Means for soBTC & soETH A quick, clear explainer on how wrapped-token redemption works, what changed after FTX/Alameda’s collapse, and practical steps to reduce risk. When backing fails, wrapped tokens can lose redemption and deviate from their peg. Key takeaways Wrapped tokens like soBTC and soETH relied on redemption backing tied to FTX/Alameda. After bankruptcy, redemption mechanisms ceased , causing price dislocations on Solana. Holders should evaluate liquidity, contract risk, and official notices before acting. Contents What Happened Wrapped ...
Create a Paysera Account (Step-by-Step): IBAN, Card, Fees & Verification Create a Paysera Account (Step-by-Step): IBAN, Card, Fees & Verification Open your account, complete KYC, access your IBAN, order a card, and set strong security—everything you need to get started with Paysera. Create, verify, and secure your Paysera account to access IBAN transfers and card payments. Key takeaways Fast onboarding: Sign up, confirm email/phone, and complete KYC to unlock features. IBAN access: After verification, find your IBAN in the app/web and receive SEPA transfers (where supported). Card options: Order a physical/virtual card (availability varies by country); control limits and regions in-app. Contents 1) Create Your Account 2) Comp...