Blockchain intelligence company TRM Labs recently released an in-depth report revealing the aftermath of the 2022 major data breach of the well-known password manager LastPass. The report states that the amount of cryptocurrency stolen related to this vulnerability has exceeded $35 million, with funds flowing directly to a coordinated Russian cybercrime organization. Notably, despite hackers employing advanced privacy tools like Wasabi Wallet and coin mixing services to cover their tracks, TRM Labs analysts successfully reconstructed the fund mixing process by identifying their unique on-chain behavior patterns, ultimately tracing the funds to Russian domestic exchanges including Cryptex (which is under U.S. sanctions) and Audi6. This case not only demonstrates successful on-chain investigation but also exposes the critical role of regional crypto infrastructure in global money laundering chains for cybercrime.
Years of “Chronic Blood Loss” in Digital Assets
The story begins with the shocking 2022 LastPass data breach. At that time, the password management service provider, with millions of users, admitted to being compromised, but the risk had not ended then. According to TRM Labs’ latest report, over the following years, attackers continuously exploited stolen credentials to systematically drain assets stored in users’ associated crypto wallets. This slow and steady theft approach, rather than one-time large transfers, made it less detectable initially, until the total losses reached tens of millions of dollars, attracting widespread attention.
These stolen funds were not static. TRM Labs’ tracking shows that the hackers demonstrated high professionalism and organization. Instead of simply transferring stolen Ethereum or other tokens directly to exchanges for cashing out, they executed a complex laundering process. First, they used instant exchange services to convert various non-Bitcoin assets into Bitcoin. This step was not only for standardizing assets but also a prerequisite for subsequent use of Bitcoin privacy tools. Then, the funds were sent into coin mixers like Wasabi Wallet or through protocols such as CoinJoin. These services work by blending large amounts of user funds to break the link between input and output addresses, aiming to completely obscure the source of funds.
However, this seemingly perfect crime was exposed by blockchain analysis techniques. TRM Labs researchers found that, despite using privacy tools, the organization left a consistent on-chain signature during operations. This signature was not just address association but a series of repeatable, recognizable behavior patterns—like a person’s unique gait or handwriting in the digital world—allowing sophisticated algorithms to identify them even amid obfuscation.
Hacker Money Laundering Path and Key On-Chain Tracking Points
Attack origin: Credentials stolen via the 2022 LastPass vulnerability.
Theft scale: Over $35 million in various cryptocurrencies.
Step 1 (Conversion): Using instant exchange services to unify various assets into Bitcoin.
Step 2 (Obfuscation): Injecting Bitcoin into Wasabi Wallet, CoinJoin, and other mixers to cut off fund flow.
Tracking breakthrough: TRM Labs identified the organization’s unique on-chain behavior or digital footprints, such as specific wallet import methods, transaction timing patterns, etc.
Final exit: After de-mixing, funds were traced to Russian domestic exchanges Cryptex and Audi6, with approximately $7 million flowing into Audi6 alone.
Regional connection: Wallets interacting with mixers showed operational links to Russia before and after laundering, indicating the hackers are likely located in the region.
The Art of “De-mixing”: How Behavioral Analysis Penetrates Privacy Tool Fog
When facing funds processed through mixers, traditional tracking methods often fall short. But TRM Labs’ behavior continuity analysis technique, showcased in this investigation, marks a new stage in on-chain investigation. Its core is tracking not just wallet addresses but the behavioral habits of the operators behind them. These habits may include: specific wallet software configurations, transaction timing preferences (related to particular time zones), unique patterns of smart contract interactions, or subtle software fingerprints left during private key import or transaction construction.
For example, although Wasabi Wallet aims to provide strong privacy guarantees for each transaction, users may inadvertently leave associated metadata or behavioral patterns during wallet operation. TRM Labs analysts achieved success by integrating and analyzing these seemingly unrelated on-chain and off-chain data points, reconstructing the mixing process and clarifying the obfuscated transactions. This process is akin to unraveling a tangled ball of yarn by recognizing the unique texture and color of each fiber, ultimately restoring its original connection path. The report powerfully demonstrates that, in advanced blockchain intelligence analysis, the anonymity provided by many privacy tools is not absolute—especially when operators reveal their own characteristics through behavioral habits.
This breakthrough is significant. It not only provides law enforcement with feasible technical paths to investigate such crimes but also serves as a warning to criminals attempting to launder money using similar methods. More importantly, it challenges the privacy technology field: true privacy protection may need to go beyond transaction obfuscation and extend to more comprehensive defense against user behavior fingerprints. This also resonates with traditional finance (TradFi) compliance, where, regardless of technological evolution, behavior-based monitoring and risk assessment remain core to anti-money laundering efforts.
Russian Trading Platforms: “Hubs” and “End Points” of Cybercrime Funds
As the fund flow paths are clarified, the chain’s endpoint points directly to Russian domestic crypto exchanges. The report highlights two: Cryptex and Audi6. Cryptex is particularly notable because it has been listed on the U.S. Department of the Treasury’s OFAC sanctions list. It is estimated that about $7 million of stolen funds flowed into Audi6, while most of the remaining funds ultimately settled on platforms like Cryptex.
These platforms played a crucial role as withdrawal channels in this incident. After complex laundering, the clean Bitcoin was exchanged into fiat or transferred further, completing the final conversion from digital assets to accessible wealth. TRM Labs notes that these platforms have long-standing and deep connections with Russia’s cybercrime underground, providing essential liquidity and financial infrastructure. The key finding is that wallets interacting with mixers showed operational links to Russia before and after laundering, strongly suggesting that the hackers are not merely renting infrastructure in Russia but are likely located within Russia or operated by Russian-speaking personnel.
This situation highlights a long-standing regulatory challenge: some jurisdictions’ crypto exchanges, due to lax local oversight or enforcement difficulties, effectively serve as transit points and sanctuaries for global cybercrime funds. Their existence greatly lowers the economic and technical barriers for cybercriminals to legitimize their illicit gains. This damages the overall reputation of the crypto industry and poses ongoing threats to global financial security. It also underscores the urgent need for establishing a coordinated international regulatory framework aligned with traditional financial standards to cut off illegal fund flows. Moreover, regulation must strike a more precise balance between combating crime and protecting legitimate users’ privacy. This case also demonstrates the vital role of private sector blockchain analysis firms, whose intelligence is becoming an important bridge connecting the crypto world with traditional law enforcement.
This multi-year, multi-million-dollar case acts as a mirror reflecting the complex challenges faced by the crypto industry in security, privacy, and regulatory compliance. It proves that, on the blockchain, traces may be carefully concealed, but as long as actions are taken, digital footprints will inevitably be left for tracing. For the entire industry, building an ecosystem that safeguards user assets and privacy while effectively combating and tracking criminal activities will remain a core focus for a long time. In this process, mature risk control concepts from traditional finance, regulatory technology, and collaboration with law enforcement provide indispensable references and tools.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
On-Chain Detective Breaks the Case: How TRM Labs Tracked $35 Million in LastPass Stolen Funds to a Russian Dark Web Network
Blockchain intelligence company TRM Labs recently released an in-depth report revealing the aftermath of the 2022 major data breach of the well-known password manager LastPass. The report states that the amount of cryptocurrency stolen related to this vulnerability has exceeded $35 million, with funds flowing directly to a coordinated Russian cybercrime organization. Notably, despite hackers employing advanced privacy tools like Wasabi Wallet and coin mixing services to cover their tracks, TRM Labs analysts successfully reconstructed the fund mixing process by identifying their unique on-chain behavior patterns, ultimately tracing the funds to Russian domestic exchanges including Cryptex (which is under U.S. sanctions) and Audi6. This case not only demonstrates successful on-chain investigation but also exposes the critical role of regional crypto infrastructure in global money laundering chains for cybercrime.
Years of “Chronic Blood Loss” in Digital Assets
The story begins with the shocking 2022 LastPass data breach. At that time, the password management service provider, with millions of users, admitted to being compromised, but the risk had not ended then. According to TRM Labs’ latest report, over the following years, attackers continuously exploited stolen credentials to systematically drain assets stored in users’ associated crypto wallets. This slow and steady theft approach, rather than one-time large transfers, made it less detectable initially, until the total losses reached tens of millions of dollars, attracting widespread attention.
These stolen funds were not static. TRM Labs’ tracking shows that the hackers demonstrated high professionalism and organization. Instead of simply transferring stolen Ethereum or other tokens directly to exchanges for cashing out, they executed a complex laundering process. First, they used instant exchange services to convert various non-Bitcoin assets into Bitcoin. This step was not only for standardizing assets but also a prerequisite for subsequent use of Bitcoin privacy tools. Then, the funds were sent into coin mixers like Wasabi Wallet or through protocols such as CoinJoin. These services work by blending large amounts of user funds to break the link between input and output addresses, aiming to completely obscure the source of funds.
However, this seemingly perfect crime was exposed by blockchain analysis techniques. TRM Labs researchers found that, despite using privacy tools, the organization left a consistent on-chain signature during operations. This signature was not just address association but a series of repeatable, recognizable behavior patterns—like a person’s unique gait or handwriting in the digital world—allowing sophisticated algorithms to identify them even amid obfuscation.
Hacker Money Laundering Path and Key On-Chain Tracking Points
The Art of “De-mixing”: How Behavioral Analysis Penetrates Privacy Tool Fog
When facing funds processed through mixers, traditional tracking methods often fall short. But TRM Labs’ behavior continuity analysis technique, showcased in this investigation, marks a new stage in on-chain investigation. Its core is tracking not just wallet addresses but the behavioral habits of the operators behind them. These habits may include: specific wallet software configurations, transaction timing preferences (related to particular time zones), unique patterns of smart contract interactions, or subtle software fingerprints left during private key import or transaction construction.
For example, although Wasabi Wallet aims to provide strong privacy guarantees for each transaction, users may inadvertently leave associated metadata or behavioral patterns during wallet operation. TRM Labs analysts achieved success by integrating and analyzing these seemingly unrelated on-chain and off-chain data points, reconstructing the mixing process and clarifying the obfuscated transactions. This process is akin to unraveling a tangled ball of yarn by recognizing the unique texture and color of each fiber, ultimately restoring its original connection path. The report powerfully demonstrates that, in advanced blockchain intelligence analysis, the anonymity provided by many privacy tools is not absolute—especially when operators reveal their own characteristics through behavioral habits.
This breakthrough is significant. It not only provides law enforcement with feasible technical paths to investigate such crimes but also serves as a warning to criminals attempting to launder money using similar methods. More importantly, it challenges the privacy technology field: true privacy protection may need to go beyond transaction obfuscation and extend to more comprehensive defense against user behavior fingerprints. This also resonates with traditional finance (TradFi) compliance, where, regardless of technological evolution, behavior-based monitoring and risk assessment remain core to anti-money laundering efforts.
Russian Trading Platforms: “Hubs” and “End Points” of Cybercrime Funds
As the fund flow paths are clarified, the chain’s endpoint points directly to Russian domestic crypto exchanges. The report highlights two: Cryptex and Audi6. Cryptex is particularly notable because it has been listed on the U.S. Department of the Treasury’s OFAC sanctions list. It is estimated that about $7 million of stolen funds flowed into Audi6, while most of the remaining funds ultimately settled on platforms like Cryptex.
These platforms played a crucial role as withdrawal channels in this incident. After complex laundering, the clean Bitcoin was exchanged into fiat or transferred further, completing the final conversion from digital assets to accessible wealth. TRM Labs notes that these platforms have long-standing and deep connections with Russia’s cybercrime underground, providing essential liquidity and financial infrastructure. The key finding is that wallets interacting with mixers showed operational links to Russia before and after laundering, strongly suggesting that the hackers are not merely renting infrastructure in Russia but are likely located within Russia or operated by Russian-speaking personnel.
This situation highlights a long-standing regulatory challenge: some jurisdictions’ crypto exchanges, due to lax local oversight or enforcement difficulties, effectively serve as transit points and sanctuaries for global cybercrime funds. Their existence greatly lowers the economic and technical barriers for cybercriminals to legitimize their illicit gains. This damages the overall reputation of the crypto industry and poses ongoing threats to global financial security. It also underscores the urgent need for establishing a coordinated international regulatory framework aligned with traditional financial standards to cut off illegal fund flows. Moreover, regulation must strike a more precise balance between combating crime and protecting legitimate users’ privacy. This case also demonstrates the vital role of private sector blockchain analysis firms, whose intelligence is becoming an important bridge connecting the crypto world with traditional law enforcement.
This multi-year, multi-million-dollar case acts as a mirror reflecting the complex challenges faced by the crypto industry in security, privacy, and regulatory compliance. It proves that, on the blockchain, traces may be carefully concealed, but as long as actions are taken, digital footprints will inevitably be left for tracing. For the entire industry, building an ecosystem that safeguards user assets and privacy while effectively combating and tracking criminal activities will remain a core focus for a long time. In this process, mature risk control concepts from traditional finance, regulatory technology, and collaboration with law enforcement provide indispensable references and tools.