InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Trust Wallet Chrome Extension Compromise Causes $7M in Cryptocurrency Loss due to Malicious Code
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Trust Wallet Chrome Extension Compromise Causes $7M in Cryptocurrency Loss due to Malicious Code
Technology

Trust Wallet Chrome Extension Compromise Causes $7M in Cryptocurrency Loss due to Malicious Code

December 27, 2025 4 Min Read
Share

TrustWallet is urging users to update their Google Chrome extension to the latest version following what it calls a “security incident” that resulted in approximately $7 million in losses.

The issue affects version 2.68, according to the multichain non-custodial cryptocurrency wallet service. According to the Chrome Web Store listing, the extension has around 1 million users. We recommend that users update to version 2.69 as soon as possible.

“We have confirmed that approximately $7 million has been affected and will ensure that all affected users are refunded,” Trust Wallet said in a post on X. “Supporting affected users is our top priority and we are actively finalizing refund procedures for affected users.”

Trust Wallet also urges users to refrain from interacting with messages other than those sent from official channels. Mobile-only users and all other browser extension versions are not affected.

According to details shared by SlowMist, version 2.68 introduced malicious code designed to iterate through all wallets stored in the extension and trigger a mnemonic phrase request for each wallet.

“The encrypted mnemonic will be decrypted using the password or passkeyPassword entered when unlocking the wallet,” the blockchain security firm said. “Once decrypted, the mnemonic phrase is sent to the attacker’s server api.metrics-trustwallet(.)com.”

The domain ‘metrics-trustwallet(.)com’ was registered on December 8, 2025, and the first request to ‘api.metrics-trustwallet(.)com’ was initiated on December 21, 2025.

Further analysis revealed that the attacker leveraged an open source full-chain analysis library named posthog-js to collect wallet user information.

The digital assets leaked so far include approximately $3 million in Bitcoin, $431 in Solana, and more than $3 million in Ethereum. The stolen funds were moved through centralized exchanges and cross-chain bridges for money laundering and swaps. According to the latest information shared by blockchain researcher ZachXBT, the incident resulted in hundreds of victims.

See also  SonicWall fixes CVE-2025-40602 that is actively being exploited on SMA 100 appliances

“While approximately $2.8 million of the stolen funds remained in the hackers’ wallets (Bitcoin/EVM/Solana), the majority of the cryptocurrencies, over $4 million, were transferred to CEX (centralized exchanges). Of that amount, approximately $3.3 million was transferred to ChangeNOW, approximately $340,000 was transferred to FixedFloat, and approximately $447,000 was transferred to KuCoin,” Peckshield said.

“This backdoor incident resulted from a malicious source code modification within Trust Wallet’s internal extension codebase (analytics logic), rather than an injected compromised third-party dependency (such as a malicious npm package),” SlowMist said.

“The attackers directly modified the application’s own code, leveraged the legitimate PostHog analytics library as a data extraction channel, and redirected the analytics traffic to attacker-controlled servers.”

The company said the attack could be the work of a nation-state attacker, adding that the attacker may have gained control of, or permission to deploy, Trust Wallet-related developer devices before December 8, 2025.

Changpeng Chao, co-founder of the cryptocurrency exchange Binance, which owns the utility, hinted that the exploit was “most likely” carried out by an insider, although no further evidence was provided to support this theory.

Share This Article
Twitter Copy Link
Previous Article Denmark has not decided whether to ban VPNs Denmark has not decided whether to ban VPNs
Next Article US tells Afghan migrants to report on Christmas and New Year's Day US tells Afghan migrants to report on Christmas and New Year’s Day

You Might Also Like

SonicWall fixes CVE-2025-40602 that is actively being exploited on SMA 100 appliances
Technology

SonicWall fixes CVE-2025-40602 that is actively being exploited on SMA 100 appliances

2 Min Read
Hackers exploit Triofox flaw to install remote access tools via antivirus
Technology

Hackers exploit Triofox flaw to install remote access tools via antivirus

3 Min Read
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

4 Min Read
Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

2 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?