Crypto Prices

Trust Wallet Addresses Security Breach Amid User Fund Losses

1 day ago
1 min read
8 views

Trust Wallet Security Breach

Trust Wallet has acknowledged a security breach linked to the version 2.68 of its browser extension, which has led to reports of missing funds from users. This particular vulnerability appears to only affect the browser extension, leaving its mobile applications and other platforms unharmed. Blockchain investigator ZachXBT has estimated that the total losses incurred by users may be around $7 million.

Incident Overview

The situation came to light when multiple users complained about the disappearance of their funds immediately after using the compromised version of the extension. On December 28, Trust Wallet’s CEO Eowyn Chen provided an update, stating that the company is actively investigating the incident to ascertain how many users were affected. So far, the Trust Wallet team has pinpointed 2,596 wallet addresses that might be involved, while about 5,000 requests for refunds have been received.

Refund Requests and Investigation

Chen mentioned that a considerable portion of these refund requests could either be duplicates or possibly fraudulent claims. To ensure the validity of these requests, Trust Wallet has initiated a comprehensive review process that includes cross-referencing various data sources before proceeding with any compensation.

Nature of the Exploit

Initial findings indicate that the suspected exploit might have stemmed from either malicious interactions or unauthorized access specifically related to the browser extension. This is a common risk, as browser-based wallets tend to be more susceptible to phishing threats, harmful scripts, and compromised extensions, which can jeopardize private keys or approval of unauthorized transactions without the users’ knowledge.

Community Assurance

Trust Wallet has reassured its community that the issue is not rooted in its mobile applications and confirms that the problem is contained. The company’s immediate focus remains on verifying the claims submitted and producing a detailed technical analysis of the breach as the investigation progresses.

Popular