Trust Wallet Users Report Sudden Wallet Drains After Installing Browser Extension (Hack Confirmed)
A growing number of cryptocurrency users have reported alarming incidents involving the Trust Wallet browser extension Hack, where entire EVM-compatible wallets were allegedly drained shortly after setup. The issue has sparked widespread concern across X (formerly Twitter) and other crypto community forums, with users sharing similar experiences and transaction evidence.
What users are reporting?
Based on multiple public reports, the sequence of events appears consistent across many cases:
Users downloaded the Trust Wallet browser extension, believing it to be legitimate
They restored their wallets by entering their seed phrase
- Within a very short period—sometimes minutes—their entire EVM wallet balance was transferred out
- Assets drained reportedly include ETH and tokens across EVM chains such as BNB Chain, Polygon, and other compatible networks
Several users claim there were no suspicious approvals, swaps, or signatures initiated from their side, pointing toward a possible private key compromise rather than normal on-chain interaction.
Reported scammer wallet addresses
Affected users have publicly flagged the following Ethereum-compatible addresses as destinations where stolen funds were transferred:
0x109252d00B2fa8C79a74CAA96d9194EEf6C995810x527b35E71Fe25E0952CEb4BE25968780B6e742280xe36E58C1849D8ba5863F3f304A873c4Edf7BAa4d0xA42297FF42A3b65091967945131cd1DB962aFae4
These addresses have been shared by multiple users on X, along with transaction hashes showing rapid fund movement shortly after wallet restoration. While attribution is still unconfirmed, users are actively tracking these wallets and urging others to blacklist them.
Is Trust Wallet compromised or Hacked?
As of now, Trust Wallet has not issued an official confirmation acknowledging a vulnerability or breach related to its browser extension. It remains unclear whether the incidents are due to:
- A fake or cloned extension
- Phishing campaigns redirecting users to malicious downloads
- Malware or clipboard hijacking on infected devices
- Pre-existing system compromise rather than a Trust Wallet flaw
Until an official statement is released, the root cause remains under investigation.
What users should do immediately
Security experts strongly advise users to:
- Never reuse a seed phrase once exposed
- Move funds to a newly generated wallet using a clean device
- Verify wallet extensions only via official websites
- Scan systems for malware before handling private keys
Final note
While confirmation from Trust Wallet is still pending, this incident reinforces a critical crypto security principle:
Anyone with your seed phrase owns your wallet.
Users are advised to remain cautious, monitor official updates, and treat wallet recovery actions with extreme care.
Stay Ahead with Chainbull
Crypto evolves every second—make sure you don’t miss a beat. Visit Chainbull for expert insights, detailed market breakdowns, and trusted updates from the world of blockchain and digital assets.