The backdoor incident in Trust Wallet version 2.68 warrants an in-depth review. By analyzing code diffs, it was discovered that hackers directly tampered with internal extension logic, hijacking mnemonic phrases when users unlock their wallets, and then stealing private key information through disguised metrics domains. This is not a supply chain contamination but a professional APT-level intrusion—attackers likely gained development deployment permissions before December 8.



From on-chain data, as of the time of the incident disclosure, approximately 33 BTC (worth about 3 million USD) had been stolen, along with about 3 million USD worth of ETH and Layer 2 assets. The hackers subsequently dispersed assets via CEXs and cross-chain bridges, indicating a strong anti-tracking awareness behind these operations.

Key signals: 1. If you are using the Trust Wallet extension, disconnect from the internet immediately for troubleshooting. 2. Export your private keys and transfer assets to another wallet immediately. 3. This type of incident reminds us that the security of open-source wallets ultimately depends on the control of each link in the supply chain—mere code visibility is insufficient to guarantee security. Moving forward, attention should be paid to the flow of hacker assets, as these data often reflect their next moves and potential trading counterparts.
BTC3,05%
ETH6,11%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)