CriticalIncident

Trust Wallet Chrome Extension Hack: $7M Lost and What It Means for Crypto Security

A supply-chain compromise of the Trust Wallet Chrome extension led to an estimated $7 million in cryptocurrency losses, highlighting critical risks in browser-based wallet security and the need for stronger self-custody safeguards.

Evan Mael
Evan Mael
Technology5views
Estimated losses$7 million+

Introduction: A Christmas Supply-Chain Nightmare

On December 24, 2025, the cryptocurrency world awoke to disturbing reports: users of the Trust Wallet Chrome extension were seeing their wallets emptied immediately after interacting with the extension. What initially seemed like isolated complaints quickly solidified into a confirmed supply-chain compromise of the extension itself.

Trust Wallet - a widely used non-custodial wallet supporting over 100 networks and Web3 dApps - released version 2.68 of its Chrome browser extension on that day. In the hours that followed, security analysts identified malicious code in that release, exfiltrating wallet seed phrases to an attacker-controlled server and enabling attackers to drain funds. :contentReference[oaicite:0]{index=0}

What Happened: Supply-Chain Code Injection

Detailed analysis of the compromised extension version shows that a JavaScript file (identified as 4482.js) contained code that silently scanned unlocked wallets and sent mnemonic seed phrases to an external endpoint (api.metrics-trustwallet[.]com). This domain was registered less than three weeks before the incident and operated outside established Trust Wallet channels.

Security researchers from multiple independent teams confirmed that the malicious logic did not merely use an analytics library; it actively decrypted mnemonic phrases after wallet unlock and transmitted them to the attacker’s server.

Once attackers possessed private keys, they swiftly transferred assets - primarily Bitcoin, Ethereum and Solana tokens - through exchanges and bridges, leaving users bereft of funds within minutes of the extension update.

Scope of Impact & Financial Losses

On-chain analysis and community reports estimate total losses at approximately $7 million in cryptocurrency. Hundreds of wallets were affected, with individual losses ranging from low-five-figures to six-figure sums, according to aggregated transaction data shared by blockchain forensic groups.

Importantly, this compromise affected only version 2.68 of the Chrome extension. Mobile app users, and other extension versions, were not impacted. Trust Wallet released version 2.69 as a mitigation and advised all users to disable the affected version immediately and reinstall only from the official Chrome Web Store.

Security Implications: Browser Wallets Under Siege

This breach underscores several critical security challenges in the modern cryptocurrency ecosystem:

  • Supply-chain vulnerabilities: Even trusted extensions can be compromised at the distribution layer.
  • Browser extension risk: Extensions operate within high-privilege environments, able to interact with unlocked wallets and critical APIs.
  • Seed phrase sensitivity: Any exposure of mnemonic seeds equates to full wallet compromise.
  • Rapid exploitation window: Attackers leveraged the holiday period to exploit slower detection and remediation timelines.

For users who store private keys or mnemonic phrases in any browser-accessible environment, this incident serves as a stark reminder: security of wallets is only as strong as the weakest link in the software supply chain.

Trust Wallet Response and Community Trust

Following this breach, cybersecurity professionals recommend:

  1. Avoid importing seed phrases in browser extensions unless absolutely necessary.
  2. Use hardware wallets or secure enclave devices for private key storage.
  3. Verify extension updates via official release notes and cryptographic signatures.
  4. Move funds to fresh wallets created in secure environments if compromise is suspected.
  5. Monitor on-chain alerts for unauthorized transactions and drain attempts.

This incident accentuates a fundamental crypto security axiom: your keys, your responsibility - and the environment in which those keys reside matters tremendously.

Conclusion: Lessons for Crypto Security Moving Forward

The Trust Wallet Chrome extension hack is a chilling example of how sophisticated supply-chain attacks can weaponize trusted software. With $7 million lost and hundreds of users impacted, the incident has reignited debate over the security of browser-based wallets and the best approaches for self-custody in a hostile threat environment.

As the Web3 ecosystem evolves, both developers and users must adopt stricter security models, including multi-party build verification, hardware key storage, and proactive code audits. Only by embracing defense-in-depth principles can the promise of decentralized finance be protected against increasingly inventive attacks.

Incident Summary

Type
Incident
Severity
Critical
Industry
Technology
Threat Actor
Unknown supply-chain attacker
Target
Unknown supply-chain attacker
Published
Dec 25, 2025

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in