Security researchers at SlowMist have identified a malicious Google Chrome extension targeting users of the TRON cryptocurrency. The extension impersonates the legitimate TronLink wallet and employs a multi-stage phishing attack to steal users' most sensitive credentials, including mnemonic phrases and private keys. By using deceptive techniques like Unicode obfuscation and a high-fidelity fake interface, the extension tricks users into surrendering complete control of their wallets. The stolen data is exfiltrated in real-time to a Telegram bot, allowing attackers to immediately drain the victim's assets. This campaign highlights the persistent threat of malicious browser extensions in the cryptocurrency space.
The attack relies on a counterfeit Chrome extension with the malicious ID ekjidonhjmneoompmjbjofpjmhklpjdd. The attackers use several tactics to deceive users:
iframe that presents a pop-up designed to look like the real TronLink interface, asking the user to "import" or "recover" their wallet.This interface is a phishing page that prompts the user to enter their mnemonic phrase (seed phrase), private key, or Keystore file and password. Once this information is submitted, it is stolen.
The attack is a sophisticated form of credential harvesting tailored for cryptocurrency users.
T1195.001 - Compromise Software Supply Chain: Compromise Software Distribution.T1598 - Phishing for Information): The core of the attack is the fake interface that phishes for the user's wallet secrets.T1071.001 - Application Layer Protocol: Web Protocols): The stolen credentials are exfiltrated via same-origin API calls from the extension's code to a Telegram bot. Using Telegram for C2 and data exfiltration is a common tactic for its ease of use and anonymity.Users who install the fake extension and enter their credentials face catastrophic and irreversible consequences.
tronfind-api[.]tronfindexplorer[.]comtrx-scan-explorer[.]orgekjidonhjmneoompmjbjofpjmhklpjddekjidonhjmneoompmjbjofpjmhklpjdd.tronfind-api.tronfindexplorer.com or trx-scan-explorer.org.iframes loading from remote sources or API calls to Telegram.Educating users to only install extensions from official vendor websites and to be suspicious of any prompt for their seed phrase is a key defense.
In a corporate environment, using browser policies to allowlist only approved extensions can prevent the installation of malicious ones.
Mapped D3FEND Techniques:
In a corporate setting, the most effective technical control against malicious browser extensions like the fake TronLink wallet is Executable Allowlisting, applied to browser extensions. System administrators should use Group Policy (for Chrome/Edge) or a similar MDM policy to create a strict allowlist of approved extension IDs that employees are permitted to install. All other extensions from the Chrome Web Store would be blocked by default. For the TronLink case, only the ID of the legitimate extension would be on the list, and the malicious ID (ekjidonhjmneoompmjbjofpjmhklpjdd) would be blocked, preventing the initial installation and neutralizing the threat entirely. This moves from a reactive posture to a proactive one, ensuring only vetted software can run in the browser environment.
For individual crypto users, User Training is the paramount defense. Users must be taught the golden rule of cryptocurrency security: never, ever type your mnemonic phrase (seed phrase) or private key into a browser window or any digital format. These keys should only be used for physical recovery onto a new, trusted device. The fake TronLink extension succeeded by tricking users into breaking this rule. Training should emphasize that legitimate wallets will not ask for your seed phrase for a simple update or login. Users should also be trained to always navigate to the official website (e.g., tronlink.org) and use the link provided there to find the correct extension in the store, rather than using the store's search function, which is susceptible to typosquatting.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.