2,596 wallet owners
The popular cryptocurrency platform Trust Wallet has fallen victim to a sophisticated supply chain attack, resulting in the theft of an estimated $7 million from its users. On December 26, 2025, the company confirmed that a malicious version (v2.68) of its Chrome browser extension was published to the official Chrome Web Store. The threat actors responsible for the attack managed to bypass Trust Wallet's internal release procedures by using a leaked API key for the Chrome Web Store. This allowed them to push the compromised extension directly. The malicious code, cleverly hidden within the extension's analytics functionality, exfiltrated sensitive user data, enabling the theft. The incident is a stark example of a Supply Chain Attack (T1195) targeting the software distribution pipeline.
The attack was a multi-stage operation targeting the software delivery process.
This incident is a classic example of Compromise Software Distribution Channel (T1195.002). The core of the attack was the abuse of a leaked API key, which represents a form of Stolen Application Access Token (T1528). By compromising the release mechanism, the attackers made the official distribution channel—the Chrome Web Store—serve malware to unsuspecting users.
The data exfiltration technique was particularly stealthy. By hiding the malicious logic within the analytics code, the attackers made it appear as legitimate telemetry. This abuse of legitimate functionality for data exfiltration is a form of Exfiltration Over C2 Channel (T1041), where the analytics service's network traffic served as the covert channel.
The direct impact is a financial loss of $7 million for Trust Wallet users. The indirect impact is a significant blow to user trust in both Trust Wallet and the security of the Chrome Web Store's review process. For the 2,596 affected users, the loss of funds is permanent unless reimbursed. The incident also forces Trust Wallet to undertake a costly incident response, public relations, and reimbursement effort. It highlights the systemic risk in software supply chains, where a single point of failure (a leaked API key) can lead to widespread compromise.
For end-users, detecting such an attack is nearly impossible, as the malicious extension was delivered through the official store. For Trust Wallet, detection could have been improved by:
Trust Wallet's response included suspending the malicious domain, expiring all release APIs, and committing to reimbursing affected users, which are appropriate steps to contain the damage and restore trust.
Preventing similar supply chain attacks requires hardening the software development and distribution lifecycle.
Trust Wallet's post-mortem reveals $8.5M stolen in 'Shai-Hulud' attack, confirming GitHub secrets compromise led to API key leak.
Trust Wallet has released a post-mortem analysis of the Chrome extension supply chain attack, now dubbed 'Shai-Hulud'. The total financial impact has increased to $8.5 million. The company confirmed that the critical Chrome Web Store API key was compromised after threat actors accessed a developer's GitHub secrets. This allowed the attackers to bypass internal security and directly upload the malicious extension. The detailed analysis provides a clearer picture of the initial compromise vector and the full extent of the financial losses, emphasizing the role of unsecured credentials in the attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats