Trust Wallet confirms second Shai-Hulud supply-chain attack

Trust Wallet has linked a second Shai-Hulud supply-chain attack to a hack on its Chrome extension, resulting in the theft of about $8.5 million in cryptocurrency. The incident involved a malicious version of the extension that exfiltrated users' sensitive wallet data. The company rolled back the compromised software and committed to reimbursing affected users.

Trust Wallet, a popular cryptocurrency wallet, disclosed details of a second supply-chain attack tied to the Shai-Hulud incident, confirming that hackers stole approximately $8.5 million in crypto assets through a compromised Chrome extension.

The breach traces back to a November 2025 supply-chain attack, where the company's developer GitHub secrets were exposed. This leak provided attackers with access to the browser extension's source code and a Chrome Web Store API key. Using these, the hackers bypassed internal release controls and published a tampered version, 2.68, on December 24, 2025. The malicious extension included code hosted on the domain metrics-trustwallet.com, designed to collect users' sensitive wallet data without traditional code injection.

As detailed in Trust Wallet's report, “The attacker registered domain metrics-trustwallet.com (and sub-domain api.metrics-trustwallet.com) with the intention of hosting malicious code and embedding a reference to that code in their malicious deployment of the Trust Wallet Browser Extension.” The code activated on every wallet unlock, iterating through all configured wallets and embedding seed phrases in disguised telemetry data sent to the attacker's server.

Cybersecurity firm Koi analyzed the malware, noting that it exfiltrated data regardless of authentication method. The domain resolved to IP address 138.124.70.40, hosted by Stark Industries Solutions, a bulletproof provider linked to Russian cyber operations. Queries to the server returned a Dune quote, referencing the original Shai-Hulud npm incident.

Wallet-draining activity surfaced on December 25, 2025, prompting swift response. Researchers 0xAkinator and ZachXBT tracked attacker wallets, while Trust Wallet issued alerts, rolled back to a clean version 2.67 (released as 2.69), and mitigated DDoS attempts. “On December 25th, the first wallet-draining activity was publicly reported,” the report states. The company prioritized a silent update for safety, then guided users to upgrade and warned those on version 2.68 (December 24–26) to move funds.

Trust Wallet disabled unauthorized publishing access, coordinated with blockchain analytics firms to trace stolen funds, and pledged reimbursements. A verification tool is planned for version 2.70, with ongoing investigations to strengthen security.

Artikel Terkait

Illustration of crypto crime surge: hackers using AI to steal $17B in scams per Chainalysis report, with charts, bitcoins, and law enforcement seizures.
Gambar dihasilkan oleh AI

Chainalysis 2026 Report: $17 Billion in 2025 Crypto Scams Amid Surging AI Fraud and Hacks

Dilaporkan oleh AI Gambar dihasilkan oleh AI

The Chainalysis 2026 Crypto Crime Report, published January 13, 2026, reveals at least $14 billion stolen in 2025 scams—projected to reach $17 billion—driven by a 1,400% surge in AI-boosted impersonation tactics, amid broader losses including $4 billion from hacks per PeckShield and $154 billion in total illicit volumes linked to nation-state actors.

A cryptocurrency investor lost over $282 million in Bitcoin and Litecoin after scammers impersonated Trezor support to steal a recovery seed phrase. The theft, revealed on January 16, 2026, by investigator ZachXBT, involved 1,459 Bitcoin and 2.05 million Litecoin stolen on January 10. The attacker laundered funds through Thorchain and converted them to Monero, causing the privacy coin's price to surge 36%.

Dilaporkan oleh AI

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

Investor kripto kaya raya, yang dulu dikenal suka pamer kekayaan mereka, kini memprioritaskan privasi sebagai respons terhadap upaya pemerasan yang ditargetkan yang disebut wrench attacks. Jurnalis Bloomberg Olivia Solon membahas perubahan ini dalam buletin Tech In Depth terbaru. Serangan ini semakin menargetkan pemegang kripto belakangan ini.

Dilaporkan oleh AI

Peretas telah mengakses dan mencuri informasi pribadi dari jutaan pengguna Pornhub, bertujuan menggunakan data tersebut untuk skema pemerasan. Insiden ini disorot dalam ringkasan berita keamanan WIRED.

Pelanggaran data signifikan telah membahayakan informasi kartu kredit lebih dari 5,6 juta individu. Insiden ini melibatkan 700Credit, di mana data dicuri melalui integrasi API pihak ketiga. Detailnya muncul dalam laporan terbaru tentang ancaman keamanan siber.

Dilaporkan oleh AI

Sepuluh paket npm dengan kesalahan ketik yang disengaja, diunggah pada 4 Juli 2025, ditemukan mengunduh infostealer yang menargetkan data sensitif di sistem Windows, Linux, dan macOS. Paket-paket ini, yang meniru pustaka populer, menghindari deteksi melalui beberapa lapisan ofusaksi dan mengumpulkan hampir 10.000 unduhan. Perusahaan keamanan siber Socket melaporkan ancaman tersebut, mencatat bahwa paket-paket tersebut masih tersedia di registry.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak