{"id":87602,"date":"2025-12-28T10:33:18","date_gmt":"2025-12-28T10:33:18","guid":{"rendered":"https:\/\/freakcryptos.com\/index.php\/2025\/12\/28\/trust-wallet-hack-claims-open-after-7m-chrome-extension-breach\/"},"modified":"2025-12-28T10:33:18","modified_gmt":"2025-12-28T10:33:18","slug":"trust-wallet-hack-claims-open-after-7m-chrome-extension-breach","status":"publish","type":"post","link":"https:\/\/freakcryptos.com\/index.php\/2025\/12\/28\/trust-wallet-hack-claims-open-after-7m-chrome-extension-breach\/","title":{"rendered":"Trust Wallet Hack Claims Open After $7M Chrome Extension Breach"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div xmlns:default=\"http:\/\/www.w3.org\/2000\/svg\">\n<p>The Trust pockets hack pushed the platform to launch a compensation course of after it detected malicious code in its Chrome browser extension. The firm mentioned the breach stayed restricted to 1 launch however prompted verified losses for a small group of customers.<\/p>\n<p><span style=\"font-weight: 400;\">Trust Wallet confirmed the problem originated in model 2.68 of the Chrome extension. The replace was printed on Dec. 24. Users who put in that launch confronted unauthorized pockets entry shortly afterward.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Trust Wallet Hack Triggers Claims Review<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">After the Trust pockets hack, Victim customers can now submit claims to the <a href=\"https:\/\/trustwallet-support.freshdesk.com\/support\/tickets\/new\" target=\"_blank\" rel=\"noopener nofollow\">official support portal<\/a>. It additionally wants a pockets deal with, attacker receiving deal with, transaction hash\u2002and nation. The platform mentioned it requires this data to confirm every declare.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The firm mentioned it would assessment claims on a case by case foundation. All submissions can be\u2002manually screened.<\/span><span style=\"font-weight: 400;\"> Trust Wallet mentioned accuracy and safety stay the precedence throughout reimbursement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trust Wallet reported the theft of about $7 million in digital belongings. The losses affected <a href=\"https:\/\/coingape.com\/trust-wallet-hack-users-hit-as-hacker-drains-btc-eth-bnb\/\">BTC, ETH, BNB and SOL wallets<\/a>.\u00a0 Blockchain safety agency PeckShield mentioned over $4 million of the stolen funds had already moved via centralized exchanges.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The platforms included ChangeNOW, FixedFloat, and KuCoin. Roughly $2.8 million remained in wallets managed by the attacker on the time of reporting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Changpeng Zhao, the founding father of Binance, <a href=\"https:\/\/coingape.com\/trust-wallet-hack-update-cz-speaks-out-on-7m-loss-promises-support\/\">confirmed that all verified losses will be covered<\/a>. Binance acquired Trust Wallet in 2018. Zhao mentioned person funds stay protected regardless of the breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The incident grew to become public after on-chain investigator ZachXBT issued alerts on Christmas Day. Users reported drained balances quickly after putting in the replace. Trust Wallet launched model 2.69 on Dec. 25 to take away the malicious code.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Breach Linked to Leaked Chrome API Key<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Trust Wallet CEO Eowyn Chen mentioned customers who logged in earlier than Dec. 26 at 11 A:M UTC confronted the very best publicity within the <a href=\"https:\/\/coingape.com\/nearly-50m-in-usdt-stolen-after-address-poisoning-scam\/\">crypto breach<\/a>. Later customers who accessed the extension weren&#8217;t affected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an <a href=\"https:\/\/x.com\/EowynChen\/status\/2004649284537647161\" target=\"_blank\" rel=\"noopener nofollow\">X post<\/a>, Chen mentioned inner findings confirmed a leaked Chrome Web Store API key was used to publish the compromised extension. This bypassed Trust Wallet\u2019s regular launch controls. Security agency SlowMist mentioned the injected code harvested pockets restoration phrases via a modified analytics library.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, Trust Wallet additionally acquired a affirmation from its finish that the issue affected solely its Chrome extension. Accordinn to firm, the problem didn&#8217;t have an effect on the cellular app customers. The Trust pockets hack has renewed scrutiny of browser-based pockets safety and software program distribution practices.<\/span><\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/coingape.com\/trust-wallet-hack-claims-open-after-7m-chrome-extension-breach\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Trust pockets hack pushed the platform to launch a compensation course of after it detected malicious code in its Chrome browser extension. The firm mentioned the breach stayed restricted to 1 launch however prompted verified losses for a small group of customers. Trust Wallet confirmed the problem originated in model 2.68 of the Chrome [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":87604,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[1124,8155,952,3405,214,1172,1420,1061],"class_list":{"0":"post-87602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-altcoin","8":"tag-breach","9":"tag-chrome","10":"tag-claims","11":"tag-extension","12":"tag-hack","13":"tag-open","14":"tag-trust","15":"tag-wallet"},"_links":{"self":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/comments?post=87602"}],"version-history":[{"count":1,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87602\/revisions"}],"predecessor-version":[{"id":87603,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/posts\/87602\/revisions\/87603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media\/87604"}],"wp:attachment":[{"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/media?parent=87602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/categories?post=87602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/freakcryptos.com\/index.php\/wp-json\/wp\/v2\/tags?post=87602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}