Foresight News reports that Trust Wallet announced that its browser plugin version 2.68 was uploaded to the Chrome Web Store by an attacker without internal approval and embedded with malicious code, which can execute transactions outside user authorization and steal wallet data. The incident has been confirmed to affect 2,520 wallet addresses, with total losses of approximately $8.5 million. Preliminary investigations indicate that this attack is related to the industry-scale supply chain incident Sha1-Hulud that occurred in November. Currently, Trust Wallet has rolled back the plugin to a safe version 2.69 and has initiated a compensation process for affected users.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Trust Wallet Browser Plugin v2.68 suffers supply chain attack, resulting in approximately $8.5 million in losses
Foresight News reports that Trust Wallet announced that its browser plugin version 2.68 was uploaded to the Chrome Web Store by an attacker without internal approval and embedded with malicious code, which can execute transactions outside user authorization and steal wallet data. The incident has been confirmed to affect 2,520 wallet addresses, with total losses of approximately $8.5 million. Preliminary investigations indicate that this attack is related to the industry-scale supply chain incident Sha1-Hulud that occurred in November. Currently, Trust Wallet has rolled back the plugin to a safe version 2.69 and has initiated a compensation process for affected users.