New findings from blockchain intelligence firm TRM Labs confirm that the far-reaching consequences of the 2022 LastPass data breach have continued to unfold years later — with threat actors cracking encrypted vaults and siphoning off millions in cryptocurrency as recently as late 2025. The multi-year exploitation campaign underscores how seemingly contained breaches can morph into long-term criminal enterprises when encrypted data falls into the wrong hands.

The ongoing thefts, attributed to Russian-linked cybercriminal infrastructure, highlight the critical importance of strong master passwords, proactive credential rotation, and robust encryption strategies for users of password managers.

What Happened in the 2022 LastPass Breach?

In August 2022, password manager LastPass disclosed a significant security breach in which attackers gained access to portions of its development environment and exfiltrated encrypted customer vault backups stored on third-party cloud infrastructure.

LastPass has long maintained a “zero knowledge” security model — meaning that user vaults are encrypted locally and LastPass does not have access to the actual master passwords or decrypted data. Nonetheless, by obtaining encrypted vault backups and associated metadata, attackers were positioned to attempt offline decryption — especially for users with weak master passwords.

At the time, LastPass emphasized that there was no evidence the attackers had decrypted vaults or accessed stored credentials, but warned users that weak master passwords could eventually be brute-forced offline.

New Evidence of Ongoing Post-Breach Exploitation

Years after the original incident, TRM Labs’ on-chain forensic investigation found that threat actors have successfully decrypted weak user vaults and stolen cryptocurrency using data stolen in 2022.

Millions in Crypto Assets Traced

According to TRM Labs:

  • More than $35 million in crypto assets are linked to vaults exposed by the breach.
  • Of this total, approximately $28 million was converted to Bitcoin and laundered through mixing services like Wasabi Wallet between late 2024 and early 2025.
  • An additional $7 million in thefts was detected in September 2025.

The attackers used advanced obfuscation techniques, including CoinJoin mixing, to complicate on-chain tracing. However, TRM Labs’ demixing and clustering analysis was able to link these flows back to wallets tied to vaults compromised in 2022.

Russian Cybercriminal Links and Laundering Infrastructure

The TRM Labs report points to Russian-associated ransomware ecosystems and exchanges as primary conduits for laundering stolen funds.

The investigation found that:

  • Stolen BTC was routed through services like Cryptomixer.io, and exchanged on platforms such as Cryptex and Audia6, both tied to illicit activity and previously sanctioned by authorities.
  • The use of these high-risk services before and after mixing suggests operational consistency often seen in established criminal networks.

TRM Labs noted this pattern — including repeated infrastructure reuse and transaction behavior — was a key component of its attribution.

Why the Theft Continued for Years

Unlike many breaches that lose relevance once exposed, the LastPass incident created a multi-year attack window because attackers retained encrypted backups.

Encrypted vault backups remain a high-value target because they contain private keys, seed phrases, and sensitive credentials that could be decrypted if the master password is weak. TRM Labs explained that attackers likely used offline brute-force cracking techniques over time to guess passwords and decrypt vault contents.

“Any vault protected by a weak master password could eventually be decrypted offline, turning a single 2022 intrusion into a multi-year window for attackers to quietly crack passwords and drain assets over time,” the firm said.

This extended timeframe allows cybercriminals to patiently work through many vaults, waiting for the right encryption weaknesses or simply using computing power and patience to find successful decryption keys.

The Role of Vault Security Practices

The ongoing misuse of stolen vault backups underscores how individual choices — especially regarding master password strength — can influence the long-term impact of a breach.

Here’s how vault security plays a role:

  • Strong, complex master passwords significantly increase the time and computing resources needed to crack encrypted vault data.
  • Higher key-stretching iteration counts in the encryption scheme make brute-force attacks much slower or practically infeasible.
  • Avoiding storage of high-value data (such as crypto seed phrases) within password manager vaults unless absolutely necessary.

Users that failed to update passwords or strengthen vault encryption after the breach exposed them left themselves vulnerable to eventual compromise.

Regulatory Action and Fines

In late 2025, the United Kingdom’s Information Commissioner’s Office (ICO) fined LastPass UK Ltd £1.2 million (approx. $1.6 million) for failing to prevent the 2022 breach.

The ICO concluded that LastPass did not implement “sufficiently robust technical and security measures” to protect user data. The breach exposed personal information — including names, emails, phone numbers, and website URLs — of approximately **1.6 million UK customers.

While passwords remained encrypted and there was no evidence that attackers were able to decrypt user password fields, the ICO held that inadequate safeguards over backup systems and access controls contributed to the exposure.

UK Information Commissioner John Edwards noted that password managers must uphold rigorous security and access governance, especially given their role guarding sensitive user credentials.

Industry Reaction and Broader Implications

Security professionals have warned that the LastPass case illustrates a broader systemic problem: breaches of encryption-protected data are never truly over if adversaries retain access to encrypted backups. The risk doesn’t vanish once the breach is public — it lingers as long as vaults can be cracked.

Experts stress that:

  • Encrypted data theft becomes a persistent threat when attackers can attempt offline decryption without detection.
  • Password managers must rigorously enforce master password complexity and transparent iteration guidance to protect vaults from long-term brute-force cracking.
  • Organizations and users alike should treat encrypted breaches as ongoing threats, not isolated incidents.

Lessons for Users and Organizations

1. Strengthen Master Passwords Now

Users should immediately update vault master passwords to long, randomly generated passphrases that are computationally infeasible to crack. Simple or reused passwords make offline cracking attacks far more effective.

Best practices include:

  • Minimum length of 16+ characters
  • A mix of character types (uppercase, lowercase, symbols)
  • Avoiding common words, phrases, or reused patterns

2. Review and Rotate Sensitive Entries

After a breach of encrypted vault backups, users should review all stored sensitive data — including seed phrases, private keys, and critical credentials — and rotate or remove them as needed, moving high-value items to more secure, dedicated storage solutions.

3. Enable Advanced Encryption Iterations

Where supported, increase key-stretching iterations on vault encryption to slow down brute-force attacks substantially. The higher the iteration count, the longer it takes to test each password guess — exponentially increasing the cost to attackers.

4. Diversify Crypto Key Storage

Storing seed phrases and private keys inside password managers can pose special risks, especially if those vaults are compromised. Many experts recommend storing such items in hardware wallets or secure offline media where feasible.

Why This Matters for Password Managers Worldwide

The LastPass incident isn’t just a case study in a single company’s misfortune — it’s a wake-up call for the entire password management industry. Services that handle encrypted user credentials with a promise of robust security must build and enforce security policies that remain effective even after a breach.

Key takeaways for providers include:

  • Rigorous internal access controls for vault key materials
  • Segmentation of duties and privileged access
  • Continuous monitoring for anomalous access vectors
  • Transparent communication with users about risk and recovery strategies

Conclusion: A Reminder That Breaches Have Long Tails

The ongoing fallout from the LastPass 2022 breach — evidenced by millions in crypto theft years later — reinforces a hard truth: cyberattacks don’t always end when the incident is disclosed. When encrypted data is compromised and weak passwords remain in circulation, attackers can quietly mine that data for profit for years.

For users, the lesson is to treat encrypted breaches seriously, update master passwords urgently, and rethink how high-value information is stored. For password managers and other custodians of sensitive data, the LastPass case highlights the need for robust encryption policies and proactive breach mitigation models that consider not just immediate impacts but long-term exploitation risks.

As 2025 closes, security researchers and regulators alike are echoing one message to users: your encrypted data remains valuable to adversaries long after the breach is public — and proactive security practices matter more than ever.