In December, Trust Wallet browser extension users discovered something terrifying—their wallets were completely emptied. Within minutes of importing their seed phrases, funds vanished across multiple transactions. This wasn’t gradual; it was instant and automated. Millions in assets were transferred to attacker-controlled addresses before users could react.
The speed and scale suggested something far worse than standard phishing: the attackers already had signing authority.
Tracing Back: How The Breach Happened
The chain of events started with what looked like a routine update on December 24. A new version of the Trust Wallet browser extension rolled out without any obvious red flags. Users updated normally, expecting standard security patches.
But hidden inside this version was something malicious.
The Hidden Weapon: Disguised Code in Plain Sight
Security researchers discovered new JavaScript code (file 4482.js) embedded in the extension. The clever part? It was disguised as analytics or telemetry tracking—the kind of monitoring code every app uses. It didn’t activate constantly either. Instead, it sat dormant until a specific trigger occurred.
For browser wallets, this is critical territory. Any unexpected outbound communication from a wallet extension represents maximum risk because it has direct access to private keys and signing functions.
The Trigger Moment: When Seed Phrases Entered the Wallet
The malicious code only activated when users imported their seed phrase into the extension. This is the exact moment when a wallet gains full control of your funds. It’s a one-time, high-stakes action—and attackers had timed their strike perfectly.
Users who never imported seed phrases (only used pre-existing wallets) escaped the attack. Those who imported? They became targets.
Communication to Criminals: The Fake Domain
When the trigger activated, the injected code reached out to an external server: metrics-trustwallet[.]com
The domain name was deliberately crafted to look legitimate—like a genuine Trust Wallet subdomain. But it was registered just days before, was never documented officially, and disappeared offline shortly after the scheme unraveled.
This outbound communication represented the moment attackers confirmed they had successfully installed their payload and could begin draining wallets.
Execution: Wallets Drained in Real-Time
Once attackers received the signal that a seed phrase had been imported, they moved with precision:
Automated transaction sequences began immediately
Assets were split across multiple attacker addresses
No approval popups or signatures were needed from the user
Consolidation happened across several wallets to fragment the trail
The victims had no opportunity to intervene. By the time they noticed their wallets were empty, the attackers had already moved the funds through their infrastructure.
Why This Attack Was So Dangerous
This incident was not typical wallet theft. It revealed several critical vulnerabilities:
Browser extensions are high-risk: They have deeper system access than web apps and can intercept sensitive functions.
Supply chain attacks are real: A single compromised update can affect hundreds of thousands of users simultaneously.
Seed phrase import is the critical moment: This is when the wallet is most vulnerable—attackers understood this and weaponized it.
Fake documentation works: A domain name that mimics legitimate infrastructure can hide malicious infrastructure in plain sight.
What Was Confirmed
A specific version of the Trust Wallet browser extension contained injected code
Users lost substantial funds shortly after seed phrase imports
The malicious domain went offline after exposure
Trust Wallet officially acknowledged a security incident
The attack was limited to the browser extension; mobile users were unaffected
What Remains Unclear
Whether this was a supply chain compromise or deliberate sabotage
The exact number of affected users
Total amount of funds drained globally
Whether seed phrases were harvested for future attacks
Who orchestrated the attack
The Lesson: Trust Nothing Blindly
This incident exposed the reality of crypto security in 2024: even established applications can be compromised. Browser extensions are particularly dangerous because they operate in a sensitive space between your computer and your assets.
Users should treat seed phrase imports as the most critical security moments. Any update should be approached with caution. And always maintain multiple layers of protection rather than trusting a single tool.
The Trust Wallet incident proves that even millions of users and a well-known brand name cannot guarantee safety. Vigilance is the only real security measure.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
How Millions Got Drained: The Trust Wallet Browser Extension Crisis
The Damage First: What Users Lost
In December, Trust Wallet browser extension users discovered something terrifying—their wallets were completely emptied. Within minutes of importing their seed phrases, funds vanished across multiple transactions. This wasn’t gradual; it was instant and automated. Millions in assets were transferred to attacker-controlled addresses before users could react.
The speed and scale suggested something far worse than standard phishing: the attackers already had signing authority.
Tracing Back: How The Breach Happened
The chain of events started with what looked like a routine update on December 24. A new version of the Trust Wallet browser extension rolled out without any obvious red flags. Users updated normally, expecting standard security patches.
But hidden inside this version was something malicious.
The Hidden Weapon: Disguised Code in Plain Sight
Security researchers discovered new JavaScript code (file 4482.js) embedded in the extension. The clever part? It was disguised as analytics or telemetry tracking—the kind of monitoring code every app uses. It didn’t activate constantly either. Instead, it sat dormant until a specific trigger occurred.
For browser wallets, this is critical territory. Any unexpected outbound communication from a wallet extension represents maximum risk because it has direct access to private keys and signing functions.
The Trigger Moment: When Seed Phrases Entered the Wallet
The malicious code only activated when users imported their seed phrase into the extension. This is the exact moment when a wallet gains full control of your funds. It’s a one-time, high-stakes action—and attackers had timed their strike perfectly.
Users who never imported seed phrases (only used pre-existing wallets) escaped the attack. Those who imported? They became targets.
Communication to Criminals: The Fake Domain
When the trigger activated, the injected code reached out to an external server: metrics-trustwallet[.]com
The domain name was deliberately crafted to look legitimate—like a genuine Trust Wallet subdomain. But it was registered just days before, was never documented officially, and disappeared offline shortly after the scheme unraveled.
This outbound communication represented the moment attackers confirmed they had successfully installed their payload and could begin draining wallets.
Execution: Wallets Drained in Real-Time
Once attackers received the signal that a seed phrase had been imported, they moved with precision:
The victims had no opportunity to intervene. By the time they noticed their wallets were empty, the attackers had already moved the funds through their infrastructure.
Why This Attack Was So Dangerous
This incident was not typical wallet theft. It revealed several critical vulnerabilities:
Browser extensions are high-risk: They have deeper system access than web apps and can intercept sensitive functions.
Supply chain attacks are real: A single compromised update can affect hundreds of thousands of users simultaneously.
Seed phrase import is the critical moment: This is when the wallet is most vulnerable—attackers understood this and weaponized it.
Fake documentation works: A domain name that mimics legitimate infrastructure can hide malicious infrastructure in plain sight.
What Was Confirmed
What Remains Unclear
The Lesson: Trust Nothing Blindly
This incident exposed the reality of crypto security in 2024: even established applications can be compromised. Browser extensions are particularly dangerous because they operate in a sensitive space between your computer and your assets.
Users should treat seed phrase imports as the most critical security moments. Any update should be approached with caution. And always maintain multiple layers of protection rather than trusting a single tool.
The Trust Wallet incident proves that even millions of users and a well-known brand name cannot guarantee safety. Vigilance is the only real security measure.