#钱包安全风险与攻击事件 Trust Wallet's recent incident data is quite revealing. The $6 million theft scale, combined with a 35% market share, makes the impact indeed significant. The key point is that the vulnerability in version 2.68 exposed a phenomenon— the real risk points of plugin wallets are not in the official code itself, but in counterfeit software and phishing attacks.
I checked the historical records, and among security incidents involving MetaMask, Phantom, and Rabby, there are not many official vulnerabilities that directly caused large-scale fund losses. Instead, the surge in fake malicious software in 2025 became the main threat. SlowMist's analysis also pointed to the PostHog JS data collection chain, indicating that attackers have a deep understanding of the source code.
Practical operational advice: If you are using an affected version of the wallet, you must export your seed phrase offline and transfer assets before reconnecting. More importantly, all plugin wallets should only be downloaded from the official Chrome Web Store or official websites. Doing this can mitigate 80% of the risks. The download volume of counterfeit applications frequently spikes in the Firefox store, which is the easiest trap for on-chain users to fall into.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
#钱包安全风险与攻击事件 Trust Wallet's recent incident data is quite revealing. The $6 million theft scale, combined with a 35% market share, makes the impact indeed significant. The key point is that the vulnerability in version 2.68 exposed a phenomenon— the real risk points of plugin wallets are not in the official code itself, but in counterfeit software and phishing attacks.
I checked the historical records, and among security incidents involving MetaMask, Phantom, and Rabby, there are not many official vulnerabilities that directly caused large-scale fund losses. Instead, the surge in fake malicious software in 2025 became the main threat. SlowMist's analysis also pointed to the PostHog JS data collection chain, indicating that attackers have a deep understanding of the source code.
Practical operational advice: If you are using an affected version of the wallet, you must export your seed phrase offline and transfer assets before reconnecting. More importantly, all plugin wallets should only be downloaded from the official Chrome Web Store or official websites. Doing this can mitigate 80% of the risks. The download volume of counterfeit applications frequently spikes in the Firefox store, which is the easiest trap for on-chain users to fall into.