Malicious Trust Wallet Chrome Extension Pushed via Leaked API Key, $7M Stolen

Trust Wallet Confirms Supply Chain Breach Led to $7 Million Cryptocurrency Theft via Malicious Chrome Extension

HIGH
December 27, 2025
December 31, 2025
5m read
Supply Chain AttackMalwareData Breach

Impact Scope

People Affected

2,596 wallet owners

Affected Companies

Trust Wallet

Industries Affected

Finance

Related Entities(initial)

Organizations

PeckShieldSlowMist

Products & Tech

Chrome Web StorePostHog

Other

Trust Wallet ChangeNOWFixedFloatKuCoinEowyn Chen

Full Report(when first published)

Executive Summary

The popular cryptocurrency platform Trust Wallet has fallen victim to a sophisticated supply chain attack, resulting in the theft of an estimated $7 million from its users. On December 26, 2025, the company confirmed that a malicious version (v2.68) of its Chrome browser extension was published to the official Chrome Web Store. The threat actors responsible for the attack managed to bypass Trust Wallet's internal release procedures by using a leaked API key for the Chrome Web Store. This allowed them to push the compromised extension directly. The malicious code, cleverly hidden within the extension's analytics functionality, exfiltrated sensitive user data, enabling the theft. The incident is a stark example of a Supply Chain Attack (T1195) targeting the software distribution pipeline.

Threat Overview

The attack was a multi-stage operation targeting the software delivery process.

  1. Compromise of Distribution Channel: The attackers obtained a valid API key for Trust Wallet's Chrome Web Store account. It is unclear how this key was leaked, but it could have been through a compromised developer machine, exposed in a public code repository, or stolen via other means.
  2. Malicious Code Injection: The attackers modified the source code of the Trust Wallet extension. According to security firm SlowMist, the malicious code was not in a third-party dependency but in the extension's own codebase. It was embedded within the analytics logic, specifically hijacking the legitimate PostHog analytics library.
  3. Unauthorized Publication: Using the leaked API key, the attackers published the malicious version 2.68 directly to the Chrome Web Store on December 24, 2025, bypassing Trust Wallet's manual review and security checks. The update was approved by Google's automated review process.
  4. Data Exfiltration: When users installed or used the malicious extension, the tampered analytics code exfiltrated sensitive data, likely including wallet seed phrases or private keys, to an attacker-controlled server.
  5. Theft and Laundering: The attackers used the stolen credentials to drain funds from 2,596 unique wallet addresses. Blockchain analysis by PeckShield shows that while ~$2.8M remains in the attacker's wallets, over $4M was quickly laundered through centralized exchanges like ChangeNOW, FixedFloat, and KuCoin.

Technical Analysis

This incident is a classic example of Compromise Software Distribution Channel (T1195.002). The core of the attack was the abuse of a leaked API key, which represents a form of Stolen Application Access Token (T1528). By compromising the release mechanism, the attackers made the official distribution channel—the Chrome Web Store—serve malware to unsuspecting users.

The data exfiltration technique was particularly stealthy. By hiding the malicious logic within the analytics code, the attackers made it appear as legitimate telemetry. This abuse of legitimate functionality for data exfiltration is a form of Exfiltration Over C2 Channel (T1041), where the analytics service's network traffic served as the covert channel.

Impact Assessment

The direct impact is a financial loss of $7 million for Trust Wallet users. The indirect impact is a significant blow to user trust in both Trust Wallet and the security of the Chrome Web Store's review process. For the 2,596 affected users, the loss of funds is permanent unless reimbursed. The incident also forces Trust Wallet to undertake a costly incident response, public relations, and reimbursement effort. It highlights the systemic risk in software supply chains, where a single point of failure (a leaked API key) can lead to widespread compromise.

Detection & Response

For end-users, detecting such an attack is nearly impossible, as the malicious extension was delivered through the official store. For Trust Wallet, detection could have been improved by:

  1. Release Process Monitoring: Implementing alerts for any software releases that do not originate from an authorized CI/CD pipeline or a specific set of IP addresses. This is a form of D3-DAM: Domain Account Monitoring for the release account.
  2. API Key Rotation and Monitoring: Regularly rotating all release API keys and monitoring their usage for any anomalies.
  3. Post-Release Verification: Having an automated process to download and verify the checksum of any extension published to the store against the official build artifact.

Trust Wallet's response included suspending the malicious domain, expiring all release APIs, and committing to reimbursing affected users, which are appropriate steps to contain the damage and restore trust.

Mitigation

Preventing similar supply chain attacks requires hardening the software development and distribution lifecycle.

  1. Secure CI/CD Pipeline: All releases must be pushed through a hardened, automated CI/CD pipeline. Manual or direct API-based publications should be strictly forbidden or require multi-person approval.
  2. API Key Security: Treat release API keys as highly sensitive secrets. Store them in a secure vault (e.g., HashiCorp Vault, AWS KMS), restrict access to a minimal number of automated systems, and implement short-lived credentials where possible. This is an application of D3-CH: Credential Hardening.
  3. Source Code Integrity: Implement mandatory peer reviews for all code changes, especially those related to authentication, cryptography, and data handling. Use static analysis security testing (SAST) tools to scan for suspicious code patterns before merging.
  4. Reproducible Builds: Ensure that builds are reproducible, meaning that compiling the same source code always produces a bit-for-bit identical binary. This allows for post-release verification to ensure the published artifact matches the approved source code.

Timeline of Events

1
December 24, 2025
The malicious version 2.68 of the Trust Wallet extension goes live on the Chrome Web Store.
2
December 26, 2025
Trust Wallet identifies the breach and warns users who installed or logged into the malicious extension before this time.
3
December 27, 2025
This article was published

Article Updates

December 31, 2025

Trust Wallet's post-mortem reveals $8.5M stolen in 'Shai-Hulud' attack, confirming GitHub secrets compromise led to API key leak.

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement strict auditing and monitoring of the software release pipeline to detect unauthorized publications.

Mapped D3FEND Techniques:

Securely manage and rotate sensitive credentials like API keys used for software distribution.

While not directly applicable to the distribution compromise, having strong internal code review and integrity checks can help detect malicious code injection.

D3FEND Defensive Countermeasures

To prevent a recurrence of this attack, Trust Wallet and other software publishers must treat distribution API keys as their most sensitive secrets. These keys should be stored in a hardware security module (HSM) or a secure secret management system like HashiCorp Vault. Access should be tightly restricted to an automated, hardened CI/CD pipeline service account, not accessible by individual developers. Implement short-lived, dynamically generated tokens for each release instead of using long-lived static API keys. Furthermore, the API key should be scoped with the principle of least privilege, only allowing it to upload but not modify or delete other versions. This hardening of credentials makes it significantly more difficult for an attacker to compromise the release process.

Trust Wallet must implement a post-publication verification system. Immediately after any new version is published to the Chrome Web Store, an automated process should download the public extension. It should then perform a cryptographic hash comparison between the published artifact and the official build artifact generated by the secure CI/CD pipeline. If there is any mismatch, this indicates a potential compromise of the distribution channel. The system should trigger an immediate, high-priority alert and automatically attempt to revoke the published version or notify a 24/7 incident response team. This 'trust but verify' approach provides a critical safety net to detect a supply chain compromise before it can affect a large number of users.

To detect the malicious code injection itself, integrate advanced Static Application Security Testing (SAST) into the pre-commit and pre-merge stages of the development lifecycle. The SAST tool should be configured with custom rules to detect suspicious patterns, such as analytics libraries making outbound calls to non-standard endpoints or code that handles sensitive data like private keys in an insecure manner. While the attackers in this case were stealthy, a sufficiently advanced SAST tool might have flagged the modification to the PostHog analytics logic as anomalous, triggering a manual security review. This adds a layer of defense against an insider threat or a compromised developer account injecting malicious code.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Trust WalletSupply Chain AttackCryptocurrencyChrome ExtensionMalwareAPI Key

📢 Share This Article

Help others stay informed about cybersecurity threats