Belief Pockets is urging customers to replace its Google Chrome extension to the newest model following what it described as a “safety incident” that led to the lack of roughly $7 million.
The problem, the multi‑chain, non‑custodial cryptocurrency pockets service mentioned, impacts model 2.68. The extension has about a million customers, in line with the Chrome Internet Retailer itemizing. Customers are suggested to replace to model 2.69 as quickly as attainable.
“We have confirmed that roughly $7M has been impacted and we’ll guarantee all affected customers are refunded,” Belief Pockets mentioned in a submit on X. “Supporting affected customers is our prime precedence, and we’re actively finalizing the method to refund the impacted customers.”
Belief Pockets can also be urging customers to chorus from interacting with any messages that don’t come from its official channels. Cell-only customers and all different browser extension variations are usually not affected.
In response to particulars shared by SlowMist, model 2.68 launched malicious code that is designed to iterate via all wallets saved within the extension and set off a mnemonic phrase request for every pockets.
“The encrypted mnemonic is then decrypted utilizing the password or passkeyPassword entered throughout pockets unlock,” the blockchain safety agency mentioned. “As soon as decrypted, the mnemonic phrase is distributed to the attacker’s server api.metrics-trustwallet[.]com.”
The area “metrics-trustwallet[.]com” was registered on December 8, 2025, with the primary request to “api.metrics-trustwallet[.]com” commencing on December 21, 2025.
Additional evaluation has revealed that the attacker has leveraged an open‑supply full‑chain analytics library named posthog-js to reap pockets consumer info.
The digital property drained up to now embody about $3 million in Bitcoin, $431 in Solana, and greater than $3 million in Ethereum. The stolen funds have been moved via centralized exchanges and cross-chain bridges for laundering and swapping. In response to an replace shared by blockchain investigator ZachXBT, the incident has claimed a whole lot of victims.
“Whereas ~$2.8 million of the stolen funds stay within the hacker’s wallets (Bitcoin/ EVM/ Solana), the majority – >$4M in cryptos – has been despatched to CEXs [centralized exchanges]: ~$3.3 million to ChangeNOW, ~$340,000 to FixedFloat, and ~$447,000 to KuCoin,” PeckShield mentioned.
“This backdoor incident originated from malicious supply code modification inside the inner Belief Pockets extension codebase (analytics logic), slightly than an injected compromised third‑get together dependency (e.g., malicious npm package deal),” SlowMist mentioned.
“The attacker immediately tampered with the appliance’s personal code, then leveraged the legit PostHog analytics library as the info‑exfiltration channel, redirecting analytic visitors to an attacker‑managed server.”
The corporate mentioned there’s a chance that it is the work of a nation-state actor, including the attackers could have gained management of Belief Pockets‑associated developer units or obtained deployment permissions previous to December 8, 2025.
Changpeng Zhao, a co-founder of crypto change Binance, which owns the utility, hinted that the exploit was “most probably” carried out by an insider, though no additional proof was supplied to assist the idea.
Replace
Belief Pockets, in a follow-up replace, has urged affected customers to full a type on their assist desk at “trustwallet-support.freshdesk[.]com” to start out the compensation course of. Victims have been requested to offer their contact e-mail deal with, nation of residence, compromised pockets deal with(es), the deal with to which the funds have been drained to, and the corresponding transaction hashes.
“We’re seeing scams by way of Telegram adverts, faux ‘compensation’ types, impersonated assist accounts, and DMs,” the corporate cautioned. “At all times confirm hyperlinks, by no means share your restoration phrase, and use official Belief Pockets channels solely.”
Eowyn Chen, Belief Pockets’s CEO, mentioned an investigation into the incident is underway, reiterating that the difficulty impacts solely Chrome browser extension model 2.68 customers who logged in and earlier than December 26, 2025, 11 a.m. UTC.
“The malicious extension v2.68 was NOT launched via our inner guide course of,” Chen mentioned. “Our present findings recommend it was most probably printed externally via the Chrome Internet Retailer API key, bypassing our commonplace launch checks.”
“The hacker used a leaked Chrome Internet Retailer API key to submit the malicious extension model v2.68. This efficiently handed the Chrome Internet Retailer’s evaluation and was launched on December 24, 2025, at 12:32 p.m. UTC.”
Following the invention of the breach, Chen mentioned the corporate has taken the step of suspending the malicious area, expiring all launch APIs, and processing reimbursement for affected victims.
(The story was up to date after publication to replicate the newest developments.)



