Trust Wallet users are facing serious security alarms: the desktop Chrome browser extension version 2.68 was compromised in a supply-chain attack, draining approximately $7 million from unsuspecting users. Affected individuals—estimated in the low thousands—are encouraged to immediately disable version 2.68, update to version 2.69, and transfer any remaining funds to newly created wallets with fresh seed phrases. These steps are critical to safeguarding assets and limiting ongoing risk.
Investigations show that attackers infiltrated the Chrome extension’s distribution pipeline—not via phishing, but by exploiting leaked developer credentials or API keys. This allowed them to upload a malicious build (v2.68) directly to the Chrome Web Store, bypassing Trust Wallet’s internal review process. The malicious update rolled out on December 24, 2025 at 12:32 p.m. UTC.
Once installed, the compromised extension executed code designed to harvest encrypted mnemonic phrases. These were decrypted locally and transmitted to attacker-controlled domains (notably metrics-trustwallet.com). Victims who unlocked the extension and entered their passwords triggered this backdoor, enabling rapid wallet draining.
Within hours of the compromised extension’s deployment, hundreds to thousands of wallets were emptied. Some estimates place the total stolen at $7 million, with a notable share of that routed through centralized exchanges like ChangeNOW, FixedFloat, and KuCoin—though an amount in the millions still remains in attacker-controlled addresses.
Trust Wallet urged all users of the Chrome extension v2.68 to:
The company also reportedly began processing reimbursements for verified victims, though they stressed the importance of validating claims over speed.
Further forensic analysis identified 2,596 wallet addresses as confirmed victims. Despite this, Trust Wallet received nearly 5,000 compensation claims, many of which appeared to be duplicative or fraudulent—highlighting the complexity of accurately reimbursing legitimate users.
This incident reiterates the vulnerabilities inherent in browser-based wallets. A compromised update—even from official sources—can trigger massive asset breaches. Vulnerability wasn’t in the underlying blockchain, but in how updates are delivered and executed.
Security response trends point toward increasing adoption of air-gapped hardware wallets, which operate entirely offline and avoid attack surfaces like supply-chain compromise. Some reports show double-digit year-over-year growth in adoption by retail and institutional users.
The need for robust zero-trust frameworks within fintech is now clearer than ever. Decentralized and permissioned control systems, combined with immutable logging and layered authentication, could reduce insider threats and software supply-chain risks in the future.
Across Reddit, users shared harrowing experiences:
A Trust Wallet user described losing funds despite maintaining strict security hygiene:
“Trust Wallet is NOT safe! My tokens disappeared with no transaction history… support was useless…”
Another recounted a deceptive swap UI that led to $40,000 lost—highlighting UX design flaws that can disguise malicious or illiquid tokens:
“…interface clearly displayed USDC… but I ended up with nearly worthless Wormhole USDC…”
These accounts underline that security threats extend beyond code; they include design ambiguity and poor UX that open users up to unintended errors.
Trust Wallet’s browser extension incident serves as a powerful reminder: user protection demands defense-in-depth, supply-chain transparency, and a shift toward isolated, secure custody methods. For now, users should:
Only users of the Chrome browser extension version 2.68 who logged in between December 24–26, 2025 were affected. Mobile app users or other extension versions were not impacted.
Roughly $7 million worth of crypto was reportedly stolen. Trust Wallet has issued warnings, rolled out version 2.69, and started a reimbursement process for confirmed victims.
Switch to hardware wallets—especially air-gapped models that never connect to the internet. Always verify updates come from official sources, and consider using wallets with granular zero-trust or multisig features.
Immediately transfer funds to a new wallet with a new seed phrase and report the compromised wallet to Trust Wallet for possible compensation—even as validation may take time.
Not inherently—but they carry elevated risk vectors, especially around updates and extensions. Offline hardware solutions remain the most secure method for long-term custody.
Python security fixes patch high‑risk vulnerabilities by directly addressing critical flaws—such as arbitrary filesystem writes,…
Node.js has released urgent security updates that fix critical flaws affecting performance, data integrity, and…
GitHub Actions security issues have recently raised serious software supply chain concerns by exposing CI/CD…
Docker vulnerabilities can seriously undermine the security and reliability of containerized workloads. They expose systems…
, approximating 1,400 words and following your instructions. Introduction Open‑source security incidents have risen significantly…
Cloudflare actively defends against massive cyber threats by automatically detecting and neutralizing large-scale Distributed Denial…