The post The Update That Drained Wallets appeared on BitcoinEthereumNews.com. What Exactly Happened in the Trust Wallet Incident Step 1: A New Browser ExtensionThe post The Update That Drained Wallets appeared on BitcoinEthereumNews.com. What Exactly Happened in the Trust Wallet Incident Step 1: A New Browser Extension

The Update That Drained Wallets

2025/12/26 07:20
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

What Exactly Happened in the Trust Wallet Incident


Step 1: A New Browser Extension Update Was Released

A new update for the Trust Wallet browser extension was released on December 24.

  • The update seemed routine.

  • No major security warnings came with it.

  • Users installed it through the usual update process.

At this point, nothing seemed suspicious.


Step 2: New Code Was Added to the Extension

After the update, researchers looking into the extension’s files noticed changes in a JavaScript file known as 4482.js.

Key observation:

This matters because browser wallets are very sensitive environments; any new outgoing logic poses a high risk.


Step 3: Code Masqueraded as “Analytics”

The added logic appeared as analytics or telemetry code.

Specifically:

  • It looked like tracking logic used by common analytics SDKs.

  • It did not trigger all the time.

  • It activated only under certain conditions.

This design made it harder to detect during casual testing.


Step 4: Trigger Condition — Importing a Seed Phrase

Community reverse-engineering suggests the logic was triggered when a user imported a seed phrase into the extension.

Why this is critical:

  • Importing a seed phrase gives the wallet full control.

  • This is a one-time, high-value moment.

  • Any malicious code only needs to act once.

Users who only used existing wallets may not have triggered this path.


Step 5: Wallet Data Was Sent Externally

When the trigger condition occurred, the code allegedly sent data to an external endpoint:

metrics-trustwallet[.]com

What raised alarms:

  • The domain looked a lot like a legitimate Trust Wallet subdomain.

  • It was registered only days earlier.

  • It was not publicly documented.

  • It later went offline.

At least, this confirms unexpected outgoing communication from the wallet extension.


Step 6: Attackers Acted Immediately

Shortly after seed phrase imports, users reported:

  • Wallets drained within minutes.

  • Multiple assets moved quickly.

  • No further user interaction was needed.

On-chain behavior showed:

  • Automated transaction patterns.

  • Multiple destination addresses.

  • No obvious phishing approval flow.

This suggests attackers already had enough access to sign transactions.


Step 7: Funds Were Consolidated Across Addresses

Stolen assets were routed through several attacker-controlled wallets.

Why this matters:

  • It suggests coordination or scripting.

  • It reduces reliance on a single address.

  • It matches behavior seen in organized exploits.

Estimates based on tracked addresses suggest millions of dollars moved, although totals vary.


Step 8: The Domain Went Dark

After attention increased:

  • The suspicious domain stopped responding.

  • No public explanation followed immediately.

  • Screenshots and cached evidence became crucial.

This is consistent with attackers destroying infrastructure once exposed.


Step 9: Official Acknowledgment Came Later

Trust Wallet later confirmed:

  • A security incident affected a specific version of the browser extension.

  • Mobile users were not affected.

  • Users should upgrade or disable the extension.

However, no full technical breakdown was given right away to explain:

  • Why the domain existed.

  • Whether seed phrases were exposed.

  • Whether this was an internal, third-party, or external issue.

This gap fueled ongoing speculation.


What Is Confirmed

  • A browser extension update introduced new outgoing behavior.

  • Users lost funds shortly after importing seed phrases.

  • The incident was limited to a specific version.

  • Trust Wallet acknowledged a security issue.


What Is Strongly Suspected

  • A supply-chain issue or malicious code injection.

  • Seed phrases or signing ability being exposed.

  • The analytics logic being misused or weaponized.


What Is Still Unknown

  • Whether the code was intentionally malicious or compromised upstream.

  • How many users were affected.

  • Whether any other data was taken.

  • Exact attribution of the attackers.


Why This Incident Matters

This was not typical phishing.

It highlights:

  • The danger of browser extensions.

  • The risk of blindly trusting updates.

  • How analytics code can be misused.

  • Why handling seed phrases is the most critical moment in wallet security.

Even a short-lived vulnerability can have serious consequences.

Source: https://www.livebitcoinnews.com/trustwallet-hack-explained-from-update-to-wallet-drains-worth-16m-in-twt-btc-eth/

시장 기회
Intuition 로고
Intuition 가격(TRUST)
$0.06815
$0.06815$0.06815
-1.28%
USD
Intuition (TRUST) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

Roll the Dice & Win Up to 1 BTC

Roll the Dice & Win Up to 1 BTCRoll the Dice & Win Up to 1 BTC

Invite friends & share 500,000 USDT!