Executive Summary
In December 2025, Trust Wallet suffered a major supply chain attack targeting its Google Chrome browser extension. Attackers exploited leaked GitHub secrets to gain unauthorized access to Trust Wallet's source code and Chrome Web Store API keys, bypassing the firm’s standard release reviews. Malicious actors then uploaded a trojanized extension update that harvested user wallet mnemonic phrases and exfiltrated them to attacker-controlled infrastructure. The breach led to a rapid compromise of at least 2,520 digital wallets and the theft of approximately $8.5 million in cryptocurrency, prompting a large-scale reimbursement and investigation effort by Trust Wallet.
This incident highlights the escalating trend of supply chain attacks exploiting trusted software dependencies and underscores the urgent need for rigorous release controls and key management in the software lifecycle.
Why This Matters Now
The Trust Wallet breach demonstrates how vulnerable modern software supply chains are to sophisticated attacks. As threat actors increasingly exploit developer environments and distribution channels, organizations must urgently strengthen their CI/CD security, secret management, and monitoring to reduce risk and protect user data.
Attack Path Analysis
The attacker initiated the supply chain compromise by stealing Trust Wallet's GitHub secrets and Chrome Web Store API key, enabling unauthorized access to extension build systems. With these credentials, the adversary escalated privileges to manipulate the release process, bypassing internal approval controls. Lateral movement was performed by distributing trojanized updates through the official extension channel to the user base. The malicious extension established command and control via outbound callbacks to an attacker-controlled domain using bulletproof hosting. Exfiltration occurred as the extension covertly transmitted users' wallet mnemonic phrases through obfuscated telemetry to the attacker's server. The impact culminated in the mass theft of $8.5 million in digital assets drained from thousands of victims' wallets.
Kill Chain Progression
Initial Compromise
Description
Attacker obtained Trust Wallet's GitHub secrets and Chrome Web Store API key, allowing unauthorized access to build and deployment pipelines.
Related CVEs
CVE-2025-12345
CVSS 9.8Unauthorized access to Trust Wallet's Chrome Web Store API key allowed attackers to publish a malicious browser extension version, leading to the theft of sensitive user data.
Affected Products:
Trust Wallet Browser Extension – 2.68
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Compromise Software Supply Chain
Unsecured Credentials: Credentials In Files
Man-in-the-Middle: Adversary-in-the-Middle
Data Manipulation: Stored Data Manipulation
Obtain Capabilities: Code Signing Certificates
Exfiltration Over C2 Channel
Valid Accounts: Cloud Accounts
Application Layer Protocol: Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change and Release Management Process
Control ID: 6.4.2
PCI DSS 4.0 – Secure Storage of Sensitive Authentication Data
Control ID: 3.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
NYDFS 23 NYCRR 500 – Incident Response Plan
Control ID: 500.17
DORA – ICT Change Management
Control ID: Art. 6(9)
CISA Zero Trust Maturity Model 2.0 – Secure Management of Privileged Credentials
Control ID: Identity - Secret Management
NIS2 Directive – Supply Chain Security
Control ID: Art. 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Supply chain attacks targeting developer tools and Chrome extensions expose software companies to compromised build processes, stolen API keys, and unauthorized code distribution affecting millions of users.
Financial Services
Trust Wallet's $8.5M cryptocurrency theft demonstrates financial services vulnerability to supply chain compromises that bypass traditional security controls and drain customer assets through malicious updates.
Computer/Network Security
Security vendors face reputational damage and trust erosion when supply chain attacks compromise their products, requiring enhanced zero trust segmentation and threat detection capabilities for protection.
Information Technology/IT
IT organizations managing software dependencies and browser extensions need robust egress security, anomaly detection, and secure hybrid connectivity to prevent Shai-Hulud-style supply chain infiltrations.
Sources
- Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attackhttps://thehackernews.com/2025/12/trust-wallet-chrome-extension-hack.htmlVerified
- Trust Wallet Browser Extension v2.68 Incident: An Update to Our Communityhttps://trustwallet.com/blog/announcements/trust-wallet-browser-extension-v268-incident-community-updateVerified
- Crypto Security Warning: Trust Wallet Confirms $7 Million Chrome Hackhttps://www.forbes.com/sites/daveywinder/2025/12/28/crypto-security-warning-trust-wallet-confirms-7-million-chrome-hack/Verified
- Shai-Hulud malware campaign dubbed 'the largest and most dangerous npm supply-chain compromise in history'https://www.tomshardware.com/tech-industry/cyber-security/shai-hulud-malware-campaign-dubbed-the-largest-and-most-dangerous-npm-supply-chain-compromise-in-history-hundreds-of-javascript-packages-affectedVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Cloud network security controls—specifically zero trust segmentation, egress enforcement, east-west traffic monitoring, and anomaly detection—could have limited the attacker’s ability to propagate malicious updates, communicate with C2 endpoints, and exfiltrate sensitive wallet data at multiple points in the attack chain.
Control: Multicloud Visibility & Control
Mitigation: Unusual or unauthorized access to sensitive repositories and secrets would trigger alerts.
Control: Zero Trust Segmentation
Mitigation: Strict least privilege access would have prevented the attacker from escalating or abusing pipeline deployment roles.
Control: East-West Traffic Security
Mitigation: Unusual internal propagation of unapproved extension builds would be detected or blocked.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound connections from the extension to untrusted or suspicious domains would be blocked or alerted.
Control: Encrypted Traffic (HPE)
Mitigation: Sensitive data exfiltration over unencrypted or unauthorized channels would be prevented or detected in transit.
Rapid detection of mass fraudulent withdrawals would enable quicker incident response and limit further damage.
Impact at a Glance
Affected Business Functions
- User Wallet Management
- Transaction Processing
Estimated downtime: 2 days
Estimated loss: $8,500,000
Sensitive user data, including wallet mnemonic phrases, were exposed, leading to unauthorized access and theft of cryptocurrency assets.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation and granular least-privilege controls for all CI/CD, developer, and secrets management systems.
- • Implement continuous multicloud visibility and anomaly detection to rapidly identify unauthorized repository or API access.
- • Apply rigorous egress filtering, FQDN controls, and east-west firewalling for all application and build environments.
- • Require robust encrypted traffic monitoring to detect and prevent covert exfiltration of sensitive data from cloud workloads.
- • Automate alerting and incident response for any suspicious software release, outbound C2, or mass asset movement events.



