Trust Wallet Extension Makes Chrome Comeback After $8.5M Security Exploit

Trust Wallet is back in the Chrome Web Store—and the crypto community is holding its breath.
The Security Breach That Shook Confidence
A multi-million dollar exploit forced the popular wallet extension offline. Attackers drained funds while users watched helplessly—another stark reminder that in crypto, your keys aren't always your coins when infrastructure fails.
The $8.5 Million Question
That's the figure floating around—the estimated haul from what appears to be a sophisticated attack vector. The incident didn't just steal funds; it stole trust, prompting a frantic scramble from the Trust Wallet team to patch vulnerabilities and restore their tarnished reputation.
Rebuilding the Fortress
The return isn't just a re-listing. It's a relaunch. The team claims to have overhauled security protocols, implementing stricter audits and enhanced monitoring. They're pitching this as a 'phoenix from the ashes' moment—stronger, wiser, and more resilient.
Will Users Forgive and Forget?
The crypto memory is notoriously short, especially during bull runs. The convenience of a browser extension often outweighs past sins for the average user. But for the security-obsessed? This episode is a textbook case for the 'not your keys, not your crypto' hardliners.
A cynical take? The $8.5M loss is a rounding error in a sector that celebrates 'building fast and breaking things'—until it's your things getting broken. The extension is back, but the real test is whether user confidence returns with it.
Holiday attack drains thousands of Trust Wallet users’ assets
In the hack that occurred in December, attackers released a malicious version 2.68 of Trust Wallet’s browser extension on Christmas Eve. Unsuspecting users were stunned when their funds got drained during a roughly two-day period between December 25 and 26.
According to Trust Wallet, 2,520 wallet addresses were affected across multiple blockchain networks.
The crypto wallet platform also added that they have a high confidence that the exploit is linked to the November Shai-Hulud supply chain attack, which targeted the npm software registry and affected thousands of repositories industry-wide.
Security researchers noted that the attackers demonstrated sophisticated planning, having staged their infrastructure by December 8, more than two weeks before deploying the compromised extension.
White-hat security researchers attempted to mitigate the damage by launching distributed denial-of-service attacks against the attackers’ infrastructure, helping to limit the number of additional victims after the breach was discovered.
Trust Wallet initially released a version 2.69 to replace the compromised version 2.68, urging users to download it; however, that new version hit a bug, as Chen pointed out.
Fraudulent claims complicate reimbursement plan
Trust Wallet, which is owned by Binance but operates as a separate entity, assured users that only the browser extension was affected. It insisted that the mobile app versions were not affected throughout the incident.
Binance founder Changpeng Zhao confirmed the company’s plan to fully reimburse all verified victims.
However, according to Chen, Trust Wallet had to revise its claims process to be more stringent after receiving over 5,000 claims despite identifying only 2,596 affected wallet addresses.
In an X post dated December 28, Chen acknowledged the irregular number of claim seekers, writing, “Our team is working diligently to verify claims; combining multiple data points to distinguish legitimate victims from malicious actors.”
Chen explained that the newly restored extension’s verification code feature will allow Trust Wallet to distinguish genuine claims from fraudulent or duplicate submissions.
Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.