Malicious TronLink Chrome Extension Uses Double-Layer Phishing to Steal Cryptocurrency Wallets

Fake TronLink Chrome Extension Deploys Double-Layer Phishing to Steal Crypto Keys

HIGH
May 10, 2026
5m read
PhishingMalwareCloud Security

Related Entities

Organizations

SlowMist

Products & Tech

TronLinkGoogle ChromeTRONTelegram

Full Report

Executive Summary

Security researchers at SlowMist have identified a malicious Google Chrome extension targeting users of the TRON cryptocurrency. The extension impersonates the legitimate TronLink wallet and employs a multi-stage phishing attack to steal users' most sensitive credentials, including mnemonic phrases and private keys. By using deceptive techniques like Unicode obfuscation and a high-fidelity fake interface, the extension tricks users into surrendering complete control of their wallets. The stolen data is exfiltrated in real-time to a Telegram bot, allowing attackers to immediately drain the victim's assets. This campaign highlights the persistent threat of malicious browser extensions in the cryptocurrency space.

Threat Overview

The attack relies on a counterfeit Chrome extension with the malicious ID ekjidonhjmneoompmjbjofpjmhklpjdd. The attackers use several tactics to deceive users:

  • Brand Spoofing: The extension is designed to look exactly like the official TronLink wallet.
  • Unicode Obfuscation: The extension's name uses Unicode characters to appear identical to the real "TronLink," making it difficult for users to spot the fake in the Chrome Web Store or their extension list.
  • Two-Layer Phishing: Once installed, the extension does not act maliciously right away. Instead, it loads a remote iframe that presents a pop-up designed to look like the real TronLink interface, asking the user to "import" or "recover" their wallet.

This interface is a phishing page that prompts the user to enter their mnemonic phrase (seed phrase), private key, or Keystore file and password. Once this information is submitted, it is stolen.

Technical Analysis

The attack is a sophisticated form of credential harvesting tailored for cryptocurrency users.

  1. Distribution: The malicious extension is distributed, likely through the official Chrome Web Store by evading Google's automated checks, or via third-party sites. This is a form of T1195.001 - Compromise Software Supply Chain: Compromise Software Distribution.
  2. Impersonation & Evasion: The use of Unicode obfuscation is a defense evasion technique to trick the user.
  3. Credential Harvesting (T1598 - Phishing for Information): The core of the attack is the fake interface that phishes for the user's wallet secrets.
  4. Exfiltration (T1071.001 - Application Layer Protocol: Web Protocols): The stolen credentials are exfiltrated via same-origin API calls from the extension's code to a Telegram bot. Using Telegram for C2 and data exfiltration is a common tactic for its ease of use and anonymity.

Impact Assessment

Users who install the fake extension and enter their credentials face catastrophic and irreversible consequences.

  • Total Loss of Funds: Once the attacker has the mnemonic phrase or private key, they have complete control over the wallet and can transfer all cryptocurrency assets to their own accounts. Due to the nature of blockchain, these transactions are irreversible.
  • Compromise of All Associated Assets: A single mnemonic phrase can control multiple accounts and assets (e.g., TRC-20 tokens, NFTs) on the TRON blockchain. All of these are compromised.

IOCs — Directly from Articles

Type
Domain
Value
tronfind-api[.]tronfindexplorer[.]com
Description
Infrastructure domain used by the malware
Type
Domain
Value
trx-scan-explorer[.]org
Description
Infrastructure domain used by the malware
Type
Other
Value
ekjidonhjmneoompmjbjofpjmhklpjdd
Description
Malicious Chrome Extension ID

Cyber Observables — Hunting Hints

  • Extension ID: Users can check their installed Chrome extensions against the malicious ID ekjidonhjmneoompmjbjofpjmhklpjdd.
  • Network Traffic: Monitor for any network connections from the browser to the IOC domains tronfind-api.tronfindexplorer.com or trx-scan-explorer.org.
  • Developer Tools: Advanced users can inspect the source code of their browser extensions using Chrome's Developer Tools to look for suspicious code, such as iframes loading from remote sources or API calls to Telegram.

Detection & Response

  • Extension Removal: Any user who has installed this extension must uninstall it immediately.
  • Asset Migration: If a user has entered their mnemonic phrase or private key into the fake extension, that wallet must be considered fully compromised. They must immediately create a new, secure wallet and transfer all assets from the compromised wallet to the new one before the attacker does. The compromised wallet should never be used again.

Mitigation

  • Install from Official Sources: Only install browser extensions from links on the official product website (e.g., tronlink.org). Do not rely on searching the Chrome Web Store, as this can lead to malicious, typosquatted results.
  • Check Extension Details: Before installing, verify the extension ID, number of users, and reviews. A low user count or suspicious reviews can be a red flag.
  • Use a Hardware Wallet: The most secure way to manage cryptocurrency is with a hardware wallet. This keeps your private keys offline, and even if your computer is compromised with malware, the keys cannot be stolen.
  • Be Skeptical of Prompts: Be extremely wary of any extension or application that asks you to enter your mnemonic phrase or private key. Legitimate wallets will only ask for this during the initial setup or recovery on a new device.

Timeline of Events

1
May 10, 2026
This article was published

MITRE ATT&CK Mitigations

Educating users to only install extensions from official vendor websites and to be suspicious of any prompt for their seed phrase is a key defense.

In a corporate environment, using browser policies to allowlist only approved extensions can prevent the installation of malicious ones.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

In a corporate setting, the most effective technical control against malicious browser extensions like the fake TronLink wallet is Executable Allowlisting, applied to browser extensions. System administrators should use Group Policy (for Chrome/Edge) or a similar MDM policy to create a strict allowlist of approved extension IDs that employees are permitted to install. All other extensions from the Chrome Web Store would be blocked by default. For the TronLink case, only the ID of the legitimate extension would be on the list, and the malicious ID (ekjidonhjmneoompmjbjofpjmhklpjdd) would be blocked, preventing the initial installation and neutralizing the threat entirely. This moves from a reactive posture to a proactive one, ensuring only vetted software can run in the browser environment.

For individual crypto users, User Training is the paramount defense. Users must be taught the golden rule of cryptocurrency security: never, ever type your mnemonic phrase (seed phrase) or private key into a browser window or any digital format. These keys should only be used for physical recovery onto a new, trusted device. The fake TronLink extension succeeded by tricking users into breaking this rule. Training should emphasize that legitimate wallets will not ask for your seed phrase for a simple update or login. Users should also be trained to always navigate to the official website (e.g., tronlink.org) and use the link provided there to find the correct extension in the store, rather than using the store's search function, which is susceptible to typosquatting.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CryptocurrencyPhishingMalwareChrome ExtensionTronLinkTRONSlowMist

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.