TrustWallet Hack Explained: From Update to Wallet Drains worth $16M in $TWT, BTC, ETH

TWT0,43%
BTC-0,46%
ETH-0,93%

What Exactly Happened in the Trust Wallet Incident


Step 1: A New Browser Extension Update Was Released

A new update for the Trust Wallet browser extension was released on December 24.

  • The update seemed routine.

  • No major security warnings came with it.

  • Users installed it through the usual update process.

At this point, nothing seemed suspicious.


Step 2: New Code Was Added to the Extension

After the update, researchers looking into the extension’s files noticed changes in a JavaScript file known as 4482.js.

Key observation:

  • The new code was not in earlier versions.

  • It introduced network requests linked to user actions.

This matters because browser wallets are very sensitive environments; any new outgoing logic poses a high risk.


Step 3: Code Masqueraded as “Analytics”

The added logic appeared as analytics or telemetry code.

Specifically:

  • It looked like tracking logic used by common analytics SDKs.

  • It did not trigger all the time.

  • It activated only under certain conditions.

This design made it harder to detect during casual testing.


Step 4: Trigger Condition — Importing a Seed Phrase

Community reverse-engineering suggests the logic was triggered when a user imported a seed phrase into the extension.

Why this is critical:

  • Importing a seed phrase gives the wallet full control.

  • This is a one-time, high-value moment.

  • Any malicious code only needs to act once.

Users who only used existing wallets may not have triggered this path.


Step 5: Wallet Data Was Sent Externally

When the trigger condition occurred, the code allegedly sent data to an external endpoint:

metrics-trustwallet[.]com

What raised alarms:

  • The domain looked a lot like a legitimate Trust Wallet subdomain.

  • It was registered only days earlier.

  • It was not publicly documented.

  • It later went offline.

At least, this confirms unexpected outgoing communication from the wallet extension.


Step 6: Attackers Acted Immediately

Shortly after seed phrase imports, users reported:

  • Wallets drained within minutes.

  • Multiple assets moved quickly.

  • No further user interaction was needed.

On-chain behavior showed:

  • Automated transaction patterns.

  • Multiple destination addresses.

  • No obvious phishing approval flow.

This suggests attackers already had enough access to sign transactions.


Step 7: Funds Were Consolidated Across Addresses

Stolen assets were routed through several attacker-controlled wallets.

Why this matters:

  • It suggests coordination or scripting.

  • It reduces reliance on a single address.

  • It matches behavior seen in organized exploits.

Estimates based on tracked addresses suggest millions of dollars moved, although totals vary.


Step 8: The Domain Went Dark

After attention increased:

  • The suspicious domain stopped responding.

  • No public explanation followed immediately.

  • Screenshots and cached evidence became crucial.

This is consistent with attackers destroying infrastructure once exposed.


Step 9: Official Acknowledgment Came Later

Trust Wallet later confirmed:

  • A security incident affected a specific version of the browser extension.

  • Mobile users were not affected.

  • Users should upgrade or disable the extension.

However, no full technical breakdown was given right away to explain:

  • Why the domain existed.

  • Whether seed phrases were exposed.

  • Whether this was an internal, third-party, or external issue.

This gap fueled ongoing speculation.


What Is Confirmed

  • A browser extension update introduced new outgoing behavior.

  • Users lost funds shortly after importing seed phrases.

  • The incident was limited to a specific version.

  • Trust Wallet acknowledged a security issue.


What Is Strongly Suspected

  • A supply-chain issue or malicious code injection.

  • Seed phrases or signing ability being exposed.

  • The analytics logic being misused or weaponized.


What Is Still Unknown

  • Whether the code was intentionally malicious or compromised upstream.

  • How many users were affected.

  • Whether any other data was taken.

  • Exact attribution of the attackers.


Why This Incident Matters

This was not typical phishing.

It highlights:

  • The danger of browser extensions.

  • The risk of blindly trusting updates.

  • How analytics code can be misused.

  • Why handling seed phrases is the most critical moment in wallet security.

Even a short-lived vulnerability can have serious consequences.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Santiment Alert: BTC profit-loss ratio hits 2.95, the top signal is approaching

Based on Santiment data, Bitcoin’s profit-to-loss trade ratio has reached 2.95:1, nearing the historical alert level of 3.0, which may signal a short-term price top. A high profit-to-loss ratio also reflects optimistic market sentiment, but it can also build up selling pressure. Historical cases show that a profit-to-loss ratio near 3.0 does not necessarily lead to a pullback; the market needs to combine multiple indicators for a comprehensive analysis.

MarketWhisper10m ago

A whale moved 300 BTC to a certain CEX about half an hour ago, incurring a loss of roughly $8.82 million

Gate News message, April 7, according to crypto analyst Yu Jin, a whale address transferred 300 BTC into a certain CEX about half an hour ago, worth approximately $20.6 million. That address previously, from January to March last year, bought a total of 510 BTC through a certain CEX at an average price of about $98,190, for a total cost of approximately $50.07 million. The 300 BTC transferred out this time corresponds to realized losses of approximately $8.82 million.

GateNews10m ago

Bitcoin may hit $110K as Strategy absorbs nearly 3x new BTC supply

Bitcoin (BTC) is trading within a bear flag pattern that projects a breakdown toward the sub-$50,000 area, or roughly 30% below current levels. However, Michael Saylor’s Strategy could spoil the bears’ plans. _BTC/USD three-day price chart. Source: __TradingView_ Key takeaways: Bitcoin has

Cointelegraph25m ago

Metaplanet 豪擲 4.05 億,超越 Strategy 奪 BTC 週買冠軍

Japan-listed company Metaplanet this week purchased 5,075 BTC for $405 million, becoming the world’s largest BTC buyer in a single week, surpassing Strategy’s $330 million. Metaplanet faces new JPX regulatory pressure, and the CEO said it will work with regulatory authorities. The total amount of BTC held by globally listed companies is 1,033,280 BTC.

MarketWhisper1h ago

“First set 10 big goals,” then add 270.37 BTC; currently, you’re up about $2.28M.

Gate News message, April 7, according to crypto analyst Ai Yi monitoring, a well-known whale address "set 10 large targets first" increased its position by 270.37 BTC at the $69,574.7 level during the market downturn. At present, this address’s BTC long position holdings total 2,520.52 BTC, with a total value of about $170 million, and an average entry price of $67,449.12, with an unrealized profit of about $2.28M.

GateNews1h ago
Comment
0/400
No comments