Startseite  >  Blog  >  Ankündigungen  >  Trust Wallet Browser Extension v2.68 Incident: An Update to Our Community
Ankündigungen

Trust Wallet Browser Extension v2.68 Incident: An Update to Our Community

Veröffentlicht am: Dec 30, 2025
Beitrag teilen
Wichtigste Punkte

A work-in-progress update on the Browser Extension v2.68 incident

Trust Wallet Browser Extension v2.68 Incident: An Update to Our Community

Transparency and user trust are core to Trust Wallet. We are sharing a work-in-progress update on what we know about the incident so far, the actions we’ve taken, and what affected users should do next.

Before getting into the details, we want to say this clearly: we deeply regret the loss, concern, and disruption this incident has caused. We understand the severity of the situation, and we recognize how unsettling it has been for many in our community.

From the moment we became aware of the security incident, teams within Trust Wallet mobilized immediately and have been working around the clock to contain the incident, prevent further losses, support affected users, and thoroughly investigate what led to it. Protecting our users and preventing additional harm has been and remains our highest priority.

Additionally, we view this incident not only as a critical lesson for Trust Wallet, but as a potential inflection point and lesson for the broader industry on evolving supply chain attacks.

What happened

On December 24, 2025, an unauthorized and malicious version of the Trust Wallet Browser Extension (version 2.68) was published to the Chrome Web Store outside of our standard release process (without mandatory review). This version contained malicious code that, when loaded, allowed the attacker to access sensitive wallet data and execute transactions without authorization.

Scope and impact

Based on our investigation, this security incident affects:

Please note that it does NOT affect:

We have identified 2,520 wallet addresses that were affected by this incident and drained by the attackers, with approximately $8.5 million in assets impacted that can be associated with 17 wallet addresses controlled by the attacker. It is important to note that we found that these attacker addresses also drained wallet addresses NOT associated with Trust Wallet and this incident. We are actively tracking other wallet addresses that may have been impacted and will release updated numbers once we have confirmation.

Trust Wallet has decided to voluntarily reimburse the affected users. We are finalizing the reimbursement workflow and ownership verification process, and have already started working with victims that have contacted us over the past few days.

What affected users should do

If you used Trust Wallet Browser Extension v2.68 during the affected period and logged in to your wallet:

Please be cautious of impersonators and refer to official channels. Trust Wallet will never ask for your private keys, seed phrases, or passwords.

We recognize how stressful this may be for affected users. We ask for your patience as the team carefully reviews all submissions. If you have been impacted and submitted the form, it's critical to ensure the privacy of your case and interact only with the official Trust Wallet support.

Reimbursement process and status

Following confirmation of the incident, and after providing actions the affected users could take to safeguard their funds from additional attacks, we initiated the reimbursement claim process for the victims.

We’ve identified 2,520 affected wallet addresses that were verifiably associated with Trust Wallet browser extension users at the time of the incident. In parallel, we have received over 5,000 claims, indicating a significant number of duplicate or false submissions likely attempting to take victims’ reimbursements.

Because of this, accurate verification of wallet ownership is crucial to ensure funds are returned to the victims and not bad actors. As seen in similar incidents across the industry, there is no method that can provide absolute certainty to distinguish victims from bad actors. We have to tread cautiously, and we are working on a "best-effort" basis to design and implement a rigorous and auditable verification process.

Our team is working diligently to verify claims; combining multiple data points to verify claim legitimacy. Claim reviews are ongoing and handled on a case-by-case basis. Due to the complexity of verification and the need to protect against fraud, processing times vary with each case. We will continue to provide updates as claim reviews progress.

We are also in the process of expanding support team capacity to better handle the work involved in this process.

Incident timeline and investigation findings (so far)

So far, our investigation suggests that the malicious build of the browser extension v2.68 was prepared independently by the attacker and distributed through an external publishing method, using a leaked API key, to the Chrome Web Store.

The investigation into the exact attack vector and sequence of events remains ongoing, however, we have high confidence that the Browser Extension v2.68 incident is likely related to the industry-wide Sha1-Hulud incident in November. We believe this incident allowed the attacker to access the browser extension source code and the Chrome Web Store API key. Using that access, they were able to prepare a tampered version of the extension with a backdoor designed to collect users’ sensitive wallet data releasing the malicious version to the Chrome Web Store using the leaked (CWS) API key.

Here is a further timeline of events:

November 2025

December 2025 - Attacker's preparation

December 2025 - Incident actions

Sha1-Hulud was an industry-wide software supply chain attack that affected companies across multiple sectors, including but not limited to crypto. It involved malicious code being introduced and distributed through commonly-used developer tooling. This allowed attackers to gain access through trusted software dependencies rather than directly targeting individual organizations.

Our commitment to security

Security is of utmost importance. In parallel with the investigation, we have actively worked on the following:

Incident response

We have already implemented additional safeguards and controls surrounding

Additional security hardening

In addition, we are bringing attention to existing Trust Wallet security practices

How we responded and ongoing efforts

Once the incident was confirmed, our team quickly rolled back and released a clean, secure release (version 2.69). Publishing access and related API credentials were disabled, and deployment permissions were restricted as part of containment.

In parallel, we worked with blockchain analytics partners and the security community to track fund movements and support affected users.

To protect users from confusion or unsafe behaviors, we prioritized replacing the vulnerable browser extension with a safe version before making a public announcement. So affected users could update securely while minimizing their potential exposure to the hack and lost funds. Once the secure version v2.69 was available, we promptly issued guidance and warnings around the incident.

And soon after, we decided to reimburse the affected users and began planning the reimbursement process for affected users.

And as a reminder, if you have received an app push via the Trust Wallet mobile app or you see a security incident banner on your Trust Wallet Browser Extension, you may still be using the compromised wallets. This means you have logged in to your wallet using Trust Wallet Browser Extension v2.68 during the affected period of December 24-26, 2025. Please take actions to transfer your funds from any at-risk wallets to a newly created wallet following these instructions.

We are also developing tooling to verify the reimbursement claims of affected users - a browser extension customer service verification code - to be released shortly in the Browser Extension version 2.70. The newly developed tool allows affected users to contribute an additional verification element to their case.


trust-wallet-browser-extension-v268-incident-community-update-1.png


We appreciate all the independent researchers, white-hat contributors, and community investigators, including those who helped flag indicators and disrupt malicious infrastructure, for their efforts.

Thank you to our community for your vigilance, support, and feedback as we work through this together. We recognize the impact this incident has had on our community and the affected users, and we appreciate your patience as our team continues to investigate and execute the reimbursement process.

While our forensic investigation is still ongoing, we have seen the community’s concerns arise that our incident is an example of a new class of supply chain attacks, and we share a similar sentiment. We will continue to update and share any new findings during our investigation through official Trust Wallet channels.

We hope that by sharing our findings, we can help the wider industry to recognize and mitigate similar security risks. By coming together as an industry, we are able to make a considerable effort in protecting against further hacks and exploits.



Disclaimer: Content is for informational purposes and not investment advice. Web3 and crypto come with risk. Please do your own research with respect to interacting with any Web3 applications or crypto assets. View our terms of service.

Join the Trust Wallet community on Telegram. Follow us on X (formerly Twitter), Instagram, Facebook, Reddit, Warpcast, and Tiktok

Note: Any cited numbers, figures, or illustrations are reported at the time of writing, and are subject to change.