Over $6 Million Stolen: Trust Wallet Source Code Compromised, How Did Official Version Become Hacker Backdoor?
Original Title: "Trust Wallet Plugin Version Attacked, Loss Exceeds $6 Million, Urgent Patch Released by Officials"
Original Author: ChandlerZ, Foresight News
On the morning of December 26, Trust Wallet issued a security alert, confirming a security vulnerability in Trust Wallet browser extension version 2.68. Users of version 2.68 should immediately disable the extension and upgrade to version 2.69. Please upgrade through the official Chrome Web Store link.
According to PeckShield monitoring, the Trust Wallet vulnerability exploit has led the hacker to steal over $6 million in cryptocurrency from victims.
Currently, about $2.8 million of the stolen funds remain in the hacker's wallet (Bitcoin / EVM / Solana), while over $4 million in cryptocurrency has been transferred to centralized exchange platforms, including: around $3.3 million to ChangeNOW, around $340,000 to FixedFloat, and around $447,000 to Kucoin.
As the number of affected users surged, code auditing for Trust Wallet version 2.68 began immediately. The security analysis team SlowMist, by comparing the source code differences between 2.68.0 (malicious version) and 2.69.0 (fixed version), discovered that the hacker had implanted a seemingly legitimate data collection code, turning the official plugin into a privacy-stealing backdoor.
Analysis: Trust Wallet Developer's Device or Code Repository Compromised by Attacker
According to SlowMist security team analysis, the core carrier of this attack was confirmed to be Trust Wallet browser extension version 2.68.0. By comparing it to the fixed version 2.69.0, security personnel found a highly disguised malicious code in the old version. As shown in the figure.


The backdoor code added a PostHog to collect various privacy information of the wallet users (including mnemonic phrases) and send it to the attacker's server api.metrics-trustwallet [.] com.
Based on code changes and on-chain activities, SlowMist provided an estimated timeline of the attack:
· December 8: The attacker begins relevant preparations;
· December 22: Successfully rolls out version 2.68 with the implanted backdoor;
· December 25: Taking advantage of the Christmas holiday, the attacker starts transferring funds based on stolen mnemonic phrases, which is later exposed.
Furthermore, SlowMist analysis believes that the attacker appears to be very familiar with Trust Wallet's extension source code. It is worth noting that the current patched version (2.69.0) has severed the malicious transfer but has not removed the PostHog JS library.
Additionally, SlowMist Technology's Chief Information Security Officer 23pds posted on social media, stating, "According to SlowMist's analysis, there is reason to believe that Trust Wallet-related developers' devices or code repositories may have been compromised by the attacker. Please disconnect the network promptly to investigate the relevant personnel's devices." He pointed out, "Users affected by the Trust Wallet version must first disconnect the network, then export the mnemonic phrase to transfer assets. Otherwise, assets will be stolen when the wallet is opened online. Those with a mnemonic backup must transfer assets first before upgrading the wallet."
Plugin Security Incidents are Common
At the same time, he pointed out that the attacker seems very familiar with Trust Wallet's extension source code, implanting PostHog JS to collect various wallet information from users. The current Trust Wallet fixed version has not removed PostHog JS.
This Trust Wallet official version turning into a trojan reminds the market of several highly risky attacks on hot wallet frontends in recent years. From attack methods to vulnerability causes, these cases provide important reference points for understanding this incident.
· When Official Channels Are No Longer Secure
Most similar to this Trust Wallet incident are attacks on software supply chains and distribution channels. In such events, users not only did not make mistakes but were even victims because they downloaded "genuine software."
Ledger Connect Kit Poisoning Incident (December 2023): Hardware wallet giant Ledger's frontend code repository was hacked by a hacker who gained permission through phishing and uploaded a malicious update package. This contaminated several top dApp frontends, including SushiSwap, displaying fake connection windows. This event is considered a textbook case of a "supply chain attack," proving that even companies with excellent security reputations, their Web2 distribution channels (such as NPM) are still high-risk single points of failure.
Hola VPN and Mega Extension Hijacking (2018): Back in 2018, the developer account of the popular VPN service Hola's Chrome extension was compromised. The hacker pushed an "official update" containing malicious code specifically designed to monitor and steal MyEtherWallet users' private keys.
· Code Vulnerability: Mnemonic Phrase Exposure Risk
Aside from supply chain attacks, implementation vulnerabilities when handling mnemonic phrases, private key material, and other sensitive data in wallets can also lead to significant asset loss.
Slope Wallet Log Data Collection Controversy (August 2022): The Solana ecosystem experienced a large-scale fund theft event, and a post-incident investigation report highlighted Slope Wallet as sending private keys or mnemonic phrases to a Sentry service (the Sentry service referred to the privately deployed Sentry service by the Slope team, not the official Sentry interface or service). However, a security firm's analysis also stated that the investigation into the Slope Wallet app has so far been unable to definitively prove that the root cause of the event was the Slope Wallet. There is a significant amount of technical work to be done, and further evidence is needed to explain the core cause of this event.
Trust Wallet Low-Entropy Key Generation Vulnerability (Disclosed as CVE-2023-31290, Exploits Traceable to 2022/2023): The Trust Wallet browser extension was found to have insufficient randomness: attackers could efficiently identify and derive potentially affected wallet addresses within a specific version range due to the enumerability introduced by a mere 32-bit seed, leading to fund theft.
· The Game of "The Good, the Bad, and the Ugly"
Within the extension wallet and browser search ecosystem, there has long been a gray-hat production chain consisting of fake plugins, fake download pages, fake update pop-ups, fake customer service DMs, and more. Once users install from unofficial channels or enter mnemonic phrases/private keys on phishing pages, their assets can be instantly drained. As events escalate to potentially impacting official versions, users' security perimeters are further reduced, often resulting in a surge of secondary scams.
At the time of writing, Trust Wallet has urged all affected users to promptly complete the version update. However, with ongoing movements of stolen on-chain funds, it is evident that the repercussions of this "Christmas heist" are far from over.
Whether it's Slope's plaintext logs or Trust Wallet's malicious backdoor, history is alarmingly repetitive. This once again serves as a reminder to every crypto user not to blind trust any single software endpoint. Regularly check authorizations, diversify asset storage, stay vigilant against suspicious version updates—perhaps this is the survival guide through the crypto dark forest.
You may also like

After two years, Hong Kong's first batch of stablecoin licenses finally issued: HSBC, Standard Chartered make the cut

The person who helped TAO rise by 90% has now single-handedly crashed the price again today

3-Minute Guide to Participating in the SpaceX IPO on Bitget

Top 5 Cryptos to Buy in 2026 Q1: A ChatGPT Deep Dive Analysis
Explore the top 5 cryptos to buy in Q1 2026 including BTC, ETH, SOL, TAO, and ONDO. See price outlooks, key narratives, and institutional catalysts shaping the next market move.

How to Earn $15,000 with Idle USDT Before Altcoin Season 2026
Wondering if altcoin season is coming in 2026? Get the latest market update, and learn how to turn your idle stablecoins waiting for entry into extra rewards up to 15,000 USDT.

Can You Win Joker Returns Without Large Trading Volume? 5 Mistakes New Players Make In WEEX Joker Returns Season 2
Can small traders win WEEX Joker Returns 2026 without huge volume? Yes—if you avoid these 5 costly mistakes. Learn how to maximize card draws, use Jokers wisely, and turn small deposits into 15,000 USDT rewards.

Altcoin Season 2026: 4 Stages to Profit (Before the Crowd FOMO In)
Altcoin Season 2026 is starting — discover the 4 key stages of capital rotation (from ETH to PEPE) and how to position before the peak. Learn which tokens will lead each phase and avoid missing the rally.

Will Alt season come in 2026? 5 Tips to Spot the Next 100x Crypto Opportunities
Will altcoin season arrive in 2026? Discover 5 rotation stages, early signals smart traders watch, and the key crypto sectors where the next 100x altcoin opportunities may emerge.

The bear market has arrived, and cryptocurrency ETF issuers are also getting involved

The richest man had a quarrel with his former boss
BTC Firm Above 70K! Saylor’s "Institutional Logic" vs. Moon’s "Retail Faith": Who is Really Harvesting the Market?
Bitcoin is holding firm above the $70,000 support level following a massive short squeeze that liquidated $427 million. As the "Four-Year Cycle" narrative shifts, the market is split: Michael Saylor’s cold, institutional "indiscriminate stacking" vs. Carl Moon’s high-energy retail "hopium." This article decodes these two polar-opposite strategies for the 2026 bull run and reveals how WEEX’s institutional-grade liquidity and AI trading tools empower every type of investor to convert market volatility into profit.

The Girl Who Created the SBTI Test: A Story of a Doomed Cyber Love, an E-Widow Ratfolk

B.AI Officially Launched: Building AI Agent Financial Bedrock Platform, Driving AGI Era Business Underlying Logic

B.AI Officially Launched: Breaking Down A2A Collaboration Barriers to Unlock the Smart Body Economy's Full Potential

We helped Xu Mingxing write a book called "<OK Life>".

Rare APY of 400%, is TradeXYZ handing out money to oil bulls?

a16z: Perpetual Contracts are Rewriting Global Trading Rules

Bitcoin Hits $73,000 Triggering $427M Short Liquidation | Carl Moon: $200,000 is the Target
April 9, 2026 (UTC+0), 22:17. Bitcoin (BTC) executed a high-velocity surge within minutes, heavy-hitting the $73,000 psychological barrier and touching a local high near $74,000. While the price has since retraced to consolidate above $72,000, this "instant ambush" successfully completed a $427M liquidation of short positions.
After two years, Hong Kong's first batch of stablecoin licenses finally issued: HSBC, Standard Chartered make the cut
The person who helped TAO rise by 90% has now single-handedly crashed the price again today
3-Minute Guide to Participating in the SpaceX IPO on Bitget
Top 5 Cryptos to Buy in 2026 Q1: A ChatGPT Deep Dive Analysis
Explore the top 5 cryptos to buy in Q1 2026 including BTC, ETH, SOL, TAO, and ONDO. See price outlooks, key narratives, and institutional catalysts shaping the next market move.
How to Earn $15,000 with Idle USDT Before Altcoin Season 2026
Wondering if altcoin season is coming in 2026? Get the latest market update, and learn how to turn your idle stablecoins waiting for entry into extra rewards up to 15,000 USDT.
Can You Win Joker Returns Without Large Trading Volume? 5 Mistakes New Players Make In WEEX Joker Returns Season 2
Can small traders win WEEX Joker Returns 2026 without huge volume? Yes—if you avoid these 5 costly mistakes. Learn how to maximize card draws, use Jokers wisely, and turn small deposits into 15,000 USDT rewards.
