Trust Wallet Chrome Extension Breach Drains $8.5M from Users

Leaked GitHub secrets let attackers push a trojanized Trust Wallet Chrome extension (linked to Shai‑Hulud 3.0), draining ~$8.5M from ~2,520 wallets; Trust Wallet opens reimbursement claims and tightens release controls.

  • Trust Wallet extension was compromised after developer GitHub secrets leaked, enabling malicious uploads to the Chrome Web Store.
  • The attacker deployed a trojanized extension that harvested wallet mnemonic phrases, draining about $8.5 million from 2,520 addresses.
  • The breach ties to the Shai-Hulud supply chain campaign; a new Shai-Hulud 3.0 variant has appeared with improved obfuscation.
  • Trust Wallet opened a reimbursement claim process and added monitoring and release controls.

Trust Wallet reported that a supply chain intrusion linked to the Shai-Hulud campaign led to a compromise of its Google Chrome extension. The company said the incident traces back to leaked developer GitHub secrets that exposed the extension source and a Chrome Web Store API key (post-mortem said).

- Advertisement -

“Our Developer GitHub secrets were exposed in the attack, which gave the attacker access to our browser extension source code and the Chrome Web Store (CWS) API key,” the company said. The attacker used the leaked key to obtain full CWS API access and upload builds without Trust Wallet’s normal approval process.

The actor registered the domain “metrics-trustwallet[.]com” and pushed a trojanized extension to a subdomain. The malicious build contained a backdoor that collected users’ wallet mnemonic phrases. (Definition: a mnemonic phrase is a sequence of words used to recover a cryptocurrency wallet.)

The malicious update was pushed on December 24, 2025, and the first wallet-draining activity was reported the next day. About $8.5 million was stolen from roughly 2,520 wallet addresses and moved to at least 17 attacker-controlled addresses.

Trust Wallet has opened a reimbursement claim process for impacted users and is reviewing claims case by case to separate victims from potential fraud. The company also said it has implemented additional monitoring and controls for its release process (post-mortem said).

- Advertisement -

Shai-Hulud is described as an industry-wide software supply chain attack (Definition: a supply chain attack inserts malicious code into trusted software dependencies to reach many targets). The campaign has evolved into a 3.0 variant. “The primary difference lies in string obfuscation, error handling, and Windows compatibility, all aimed at increasing campaign longevity rather than introducing novel exploitation techniques,” Upwind researchers Guy Gilad and Moshe Hassan said.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

SEC’s Paul Atkins, CFTC’s Michael Selig to Discuss US Crypto

SEC Chair Paul Atkins and CFTC Chair Michael Selig will hold an event on...

Tesla market share falls to 9.9% in California; Toyota grows

Tesla registrations in California fell to 179,656 in 2025, down from 202,865 the prior...

Capital One to Buy Brex for $5.15B Boosting Business Crypto.

Capital One agreed to buy San Francisco-based Brex in a $5.15 billion stock-and-cash deal.The...

Nasdaq Removes Options Limits on Spot Bitcoin and Ether ETFs

Nasdaq removed 25,000-contract limits on options tied to spot Bitcoin and Ether ETFs.The rule...

AMD rallies on AI one-click bundle, partnerships to $275 Jan

AMD stock has climbed recently and is being positioned to reach $275 by the...
- Advertisement -

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!