👉 NO APPROVALS. NO WARNINGS. $7M GONE.

1ïžâƒŁ On Dec 24, Trust Wallet released Chrome Extension v2.68

Hidden inside: malicious code disguised as analytics.

2ïžâƒŁ When users opened wallets or entered seed phrases,

the code secretly sent them to a fake domain: metrics-trustwallet.com

3ïžâƒŁ With seed phrases stolen, hackers didn’t need approvals.

They simply restored wallets elsewhere and drained everything.

4ïžâƒŁ Damage so far:

đŸ’„ $7M+ stolen

đŸ’„ BTC, ETH, SOL, BNB Chain affected

đŸ’„ Some users lost six figures in minutes

5ïžâƒŁ Stolen funds flowed through: ChangeNOW ‱ FixedFloat ‱ KuCoin ‱ HTX

6ïžâƒŁ CZ CONFIRMS:

Trust Wallet will fully reimburse all affected users

“User funds are SAFU.”

7ïžâƒŁ 🚹 DO THIS NOW

❌ Avoid v2.68

✅ Update to v2.69 (official store only)

🔁 If you used v2.68 → move funds to a new wallet immediately

8ïžâƒŁ 🧠 Lesson:

Browser wallets = higher risk

Wallet-level hacks = full access

📊 $3.4B+ stolen in crypto in 2025 alone

🔐 Verify everything. Never share your seed phrase

#TrustWallet #TrustWalletHack