Trust Wallet Chrome Extension Hack Drains $8.5M

Overview of the Trust Wallet Chrome Extension Hack

Trust Wallet Chrome Extension Hack exposed a serious software supply chain breach in late 2025. According to an incident report, attackers compromised a browser extension update to steal user assets. Therefore, the breach quickly escalated into a large financial loss.

The attack resulted in approximately $8.5 million in stolen cryptocurrency. Moreover, the malicious update reached users through an official extension marketplace. As a result, victims trusted and installed the compromised version.

How the Supply Chain Attack Began

Attackers gained access after developer secrets leaked from a source code repository. These secrets provided access to the extension source code and publishing credentials. Therefore, attackers bypassed internal review and approval processes entirely.

With this access, the attackers uploaded builds directly to the extension store. However, these builds did not go through manual verification. As a result, malicious code entered production unnoticed.

Trojanized Extension Deployment

After gaining publishing access, attackers registered a lookalike analytics domain. This domain supported a trojanized extension update containing a hidden backdoor. Therefore, the malicious extension appeared legitimate to users.

The backdoor harvested wallet recovery phrases automatically. Moreover, it transmitted stolen data to attacker-controlled infrastructure. As a result, sensitive credentials leaked silently.

Malicious Code Behavior

The malicious code activated during every wallet unlock event. For example, it triggered even when users did not import seed phrases. Therefore, attackers collected data regardless of authentication method.

The code also scanned all wallets stored in the extension. Moreover, users with multiple wallets lost all of them. As a result, damage extended beyond a single account.

Infrastructure and Hosting Details

The attacker-controlled domain resolved to infrastructure hosted by a provider known for abuse tolerance. This hosting service has links to past cybercriminal activity. Therefore, takedown efforts faced delays.

Interestingly, direct server queries returned cryptic pop culture references. Moreover, researchers observed similar references in earlier supply chain attacks. As a result, investigators linked this incident to a broader campaign.

Evidence of Preplanned Execution

Server metadata revealed early infrastructure preparation. For example, timestamps showed staging weeks before deployment. Therefore, researchers concluded the attack was deliberate.

The malicious update appeared on December 24, 2025. However, wallet draining reports surfaced the next day. As a result, attackers acted quickly.

Impact on Users and Assets

Attackers drained funds from 2,520 wallet addresses. Moreover, stolen assets moved into at least 17 attacker-controlled wallets. Therefore, tracing recovery became complex.

The wallet provider urged users to update immediately. Additionally, it warned that older versions remained unsafe. As a result, rapid updates became critical.

Reimbursement and Response Measures

The provider launched a reimbursement claim process for victims. However, each claim requires manual review to prevent fraud. Therefore, processing timelines vary.

The organization also strengthened release monitoring controls. Moreover, it improved detection for unauthorized publishing activity. As a result, future risks should decrease.

Broader Supply Chain Threat Context

Researchers described the attack as part of a wider industry problem. Supply chain threats abuse trusted development tools instead of direct exploitation. Therefore, many sectors face similar risks.

New versions of the same malware family continue to emerge. However, these versions focus on stealth and longevity. As a result, developer environments remain prime targets.

How to Prevent Similar Attacks

Organizations can reduce risk by securing development pipelines and credentials. Continuous monitoring helps detect unauthorized changes early. Moreover, strict access controls limit credential abuse.

Endpoint threat detection and rapid incident response also reduce damage. Therefore, combining pipeline security with real-time monitoring significantly lowers supply chain attack impact.

Sleep well, we got you covered.

Scroll to Top