Crypto Christmas Heist: Over $6 Million Lost, Trust Wallet Chrome Extension Wallet Hacked Analysis
Original Title: "Christmas Heist | Trust Wallet Browser Extension Wallet Hacked Analysis"
Original Source: SlowMist Technology
Background
Early this morning Beijing time, @zachxbt announced in the channel, "Some Trust Wallet users reported that funds in their wallet addresses have been stolen in the past few hours." Subsequently, Trust Wallet's official X also released an official statement confirming a security vulnerability in Trust Wallet Browser Extension version 2.68, advising all users using version 2.68 to immediately disable this version and upgrade to version 2.69.

Tactics
Upon receiving the intelligence, the SlowMist security team promptly conducted an analysis of the relevant samples. Let's first compare the core code of the previously released 2.67 and 2.68 versions:


By diffing the code of the two versions, we found the malicious code added by the hacker:

The malicious code will traverse all wallets in the plugin, make a "get mnemonic phrase" request for each user's wallet to obtain the user's encrypted mnemonic phrase, and finally use the password or passkeyPassword entered by the user when unlocking the wallet for decryption. If decryption is successful, the user's mnemonic phrase will be sent to the attacker's domain `api.metrics-trustwallet[.]com`.

We also analyzed the attacker's domain information; the attacker used the domain: metrics-trustwallet.com.

Upon investigation, the registration time of this malicious domain was 2025-12-08 02:28:18, and the domain registrar is: NICENIC INTERNATIONA.
Request records targeting api.metrics-trustwallet[.]com began on 2025-12-21.

This timestamp and the implantation of the backdoor with code 12.22 are roughly the same.
We continue to reproduce the entire attack process through code tracking analysis:
Through dynamic analysis, it can be seen that after unlocking the wallet, the attacker filled the mnemonic information into the error in R1.

And the source of this Error data is obtained through the GET_SEED_PHRASE function call. Currently, Trust Wallet supports two ways to unlock: password and passkeyPassword. The attacker, during the unlocking process, obtained the password or passkeyPassword, then called GET_SEED_PHRASE to obtain the wallet's mnemonic phrase (private key as well), and then placed the mnemonic phrase in the "errorMessage".

Below is the code using emit to call GetSeedPhrase to obtain the mnemonic phrase data and fill it into the error.

Traffic analysis performed through BurpSuite shows that after obtaining the mnemonic phrase, it is encapsulated in the request body's errorMessage field and sent to a malicious server (https[://]api[.]metrics-trustwallet[.]com), which is consistent with the previous analysis.

Through the above process, the theft of the mnemonic phrase/private key is completed. In addition, the attacker is also familiar with the source code and utilizes the open-source full-lifecycle product analysis platform PostHogJS to collect user wallet information.
Stolen Asset Analysis

(https://t.me/investigations/296)
According to ZachXBT's disclosed hacker address, we have calculated that as of the time of publication, the total amount of stolen assets on the Bitcoin blockchain is approximately 33 BTC (valued at around 3 million USD), the stolen assets on the Solana blockchain are valued at around 431 USD, and the stolen assets on the Ethereum mainnet and Layer 2 chains are valued at around 3 million USD. After stealing the coins, the hacker used various centralized exchanges and cross-chain bridges to transfer and exchange some of the assets.


Summary
This backdoor incident originated from a malicious code modification to the Trust Wallet extension's internal codebase (analytics service logic), rather than the introduction of a tampered third-party package (such as a malicious npm package). The attacker directly altered the application's own code, using the legitimate PostHog library to redirect analytics data to a malicious server. Therefore, we have reason to believe this was a professional APT attack, where the attacker may have gained control of Trust Wallet-related developers' device or release deployment permissions prior to December 8.
Recommendations:
1. If you have installed the Trust Wallet extension wallet, you should immediately disconnect from the internet as a prerequisite for investigation and actions.
2. Immediately export your private key/mnemonic phrase and uninstall the Trust Wallet extension wallet.
3. After backing up your private key/mnemonic phrase, promptly transfer your funds to another wallet.
You may also like

Airdrops cannot make you rich, edgeX does not need a community

Artificial intelligence agents are about to take away Visa's market share
2026 Crypto Tax Rules: How Bitcoin Price Changes Affect Your Filing
BTC trades around $67,500 today. If you sold near $126,000 last year, you still owe tax on those gains, regardless of where the price is now. Here's what every trader needs to know this tax season.

OpenClaw 3.28 Update: Potential Security Risks with Axios
Key Takeaways Recent findings suggest OpenClaw version 3.28 may contain a compromised version of the Axios library. Dependency…

Steakhouse Financial Experiences Phishing Attack: A Comprehensive Overview
Key Takeaways Steakhouse Financial’s domain experienced a phishing attack, prompting user safety advisories. Depositors’ funds and smart contracts…

DeFi Risk Management in Turmoil: Gauntlet’s Bold Move Amidst Resolv Exploit
Key Takeaways Gauntlet, a leading DeFi risk manager, is engaging in full recovery efforts after Resolv Labs’ exploit.…

FTX/Alameda Wallet Transfers Over $8 Million in ZRO Tokens to Wintermute
Key Takeaways An FTX/Alameda-associated wallet moved 4.126 million ZRO tokens to market maker Wintermute, with an approximate value…

Analysis of Recent Ethereum Short Position Activity on HyperLiquid
Key Takeaways Recently, a newly created wallet deposited $4.89 million into HyperLiquid, opening a short ETH position with…

Only 43% ROI on $1, why are 87% of Polymarket traders in the red?

After L2 Fraud, Ethereum Turns to ‘Economic Zone’ Self-Help

AI has simultaneously created a shortage and surplus of memory

How Can the Average Person Win in the 2026 AI Boom?

When Wall Street Meets Crypto, Here's Your "Stock Market Beginner & Advanced Guide"

StandX Introduces SIP1 and SIP2: Holding Subsidy Mechanism Launched, Reshaping On-Chain Trading and Reward Structure

Decoding Aave V4: A Shift from Product to "Banking"

Huobi HTX Releases "2026 Digital Asset Trends Whitepaper": Global Liquidity Reconfiguration, Defining the New Era of "On-Chain Finance"

PUMP Valuation Breakdown: Debunking On-Chain Data “Wash Trading” Narrative, Where Does the Real Discount Come From?

StandX launches SIP1 and SIP2: Position subsidy mechanism goes live, reshaping on-chain trading and revenue structure
Airdrops cannot make you rich, edgeX does not need a community
Artificial intelligence agents are about to take away Visa's market share
2026 Crypto Tax Rules: How Bitcoin Price Changes Affect Your Filing
BTC trades around $67,500 today. If you sold near $126,000 last year, you still owe tax on those gains, regardless of where the price is now. Here's what every trader needs to know this tax season.
OpenClaw 3.28 Update: Potential Security Risks with Axios
Key Takeaways Recent findings suggest OpenClaw version 3.28 may contain a compromised version of the Axios library. Dependency…
Steakhouse Financial Experiences Phishing Attack: A Comprehensive Overview
Key Takeaways Steakhouse Financial’s domain experienced a phishing attack, prompting user safety advisories. Depositors’ funds and smart contracts…
DeFi Risk Management in Turmoil: Gauntlet’s Bold Move Amidst Resolv Exploit
Key Takeaways Gauntlet, a leading DeFi risk manager, is engaging in full recovery efforts after Resolv Labs’ exploit.…
