What Exactly Happened in the Trust Wallet Hack Step 1: A New Browser Extension Update Was Released A new update for the Trust Wallet browser extension was releasedWhat Exactly Happened in the Trust Wallet Hack Step 1: A New Browser Extension Update Was Released A new update for the Trust Wallet browser extension was released

TrustWallet Hack Explained: From Update to Wallet Drains worth $4M in $TWT, BTC, ETH

2025/12/26 07:14
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

What Exactly Happened in the Trust Wallet Hack


Step 1: A New Browser Extension Update Was Released

A new update for the Trust Wallet browser extension was released on December 24.

  • The update seemed routine.
  • No major security warnings came with it.
  • Users installed it through the usual update process.

At this point, nothing seemed suspicious.


Step 2: New Code Was Added to the Extension

After the update, researchers looking into the extension’s files noticed changes in a JavaScript file known as 4482.js.

Key observation:

  • The new code was not in earlier versions.
  • It introduced network requests linked to user actions.

This matters because browser wallets are very sensitive environments; any new outgoing logic poses a high risk.


Step 3: Code Masqueraded as “Analytics”

The added logic appeared as analytics or telemetry code.

Specifically:

  • It looked like tracking logic used by common analytics SDKs.
  • It did not trigger all the time.
  • It activated only under certain conditions.

This design made it harder to detect during casual testing.


Step 4: Trigger Condition Importing a Seed Phrase

Community reverse-engineering suggests the logic was triggered when a user imported a seed phrase into the extension.

Why this is critical:

  • Importing a seed phrase gives the wallet full control.
  • This is a one-time, high-value moment.
  • Any malicious code only needs to act once.

Users who only used existing wallets may not have triggered this path.


Step 5: Wallet Data Was Sent Externally

When the trigger condition occurred, the code allegedly sent data to an external endpoint:

metrics-trustwallet[.]com

What raised alarms:

  • The domain looked a lot like a legitimate Trust Wallet subdomain.
  • It was registered only days earlier.
  • It was not publicly documented.
  • It later went offline.

At least, this confirms unexpected outgoing communication from the wallet extension.


Step 6: Attackers Acted Immediately

Shortly after seed phrase imports, users reported:

  • Wallets drained within minutes.
  • Multiple assets moved quickly.
  • No further user interaction was needed.

On-chain behavior showed:

  • Automated transaction patterns.
  • Multiple destination addresses.
  • No obvious phishing approval flow.

This suggests attackers already had enough access to sign transactions.


Step 7: Funds Were Consolidated Across Addresses

Stolen assets were routed through several attacker-controlled wallets.

Why this matters:

  • It suggests coordination or scripting.
  • It reduces reliance on a single address.
  • It matches behavior seen in organized exploits.

Estimates based on tracked addresses suggest millions of dollars moved, although totals vary.


Step 8: The Domain Went Dark

After attention increased:

  • The suspicious domain stopped responding.
  • No public explanation followed immediately.
  • Screenshots and cached evidence became crucial.

This is consistent with attackers destroying infrastructure once exposed.


Step 9: Official Acknowledgment Came Later

Trust Wallet later confirmed:

  • A security incident affected a specific version of the browser extension.
  • Mobile users were not affected.
  • Users should upgrade or disable the extension.

However, no full technical breakdown was given right away to explain:

  • Why the domain existed.
  • Whether seed phrases were exposed.
  • Whether this was an internal, third-party, or external issue.

This gap fueled ongoing speculation.


What Is Confirmed

  • A browser extension update introduced new outgoing behavior.
  • Users lost funds shortly after importing seed phrases.
  • The incident was limited to a specific version.
  • Trust Wallet acknowledged a security issue.

What Is Strongly Suspected

  • A supply-chain issue or malicious code injection.
  • Seed phrases or signing ability being exposed.
  • The analytics logic being misused or weaponized.

What Is Still Unknown

  • Whether the code was intentionally malicious or compromised upstream.
  • How many users were affected.
  • Whether any other data was taken.
  • Exact attribution of the attackers.

Why This Incident Matters

This was not typical phishing.

It highlights:

  • The danger of browser extensions.
  • The risk of blindly trusting updates.
  • How analytics code can be misused.
  • Why handling seed phrases is the most critical moment in wallet security.

Even a short-lived vulnerability can have serious consequences.

The post TrustWallet Hack Explained: From Update to Wallet Drains worth $4M in $TWT, BTC, ETH appeared first on Live Bitcoin News.

시장 기회
Ambire Wallet 로고
Ambire Wallet 가격(WALLET)
$0.00878
$0.00878$0.00878
-0.79%
USD
Ambire Wallet (WALLET) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

Roll the Dice & Win Up to 1 BTC

Roll the Dice & Win Up to 1 BTCRoll the Dice & Win Up to 1 BTC

Invite friends & share 500,000 USDT!