HomeMarket News

Trust Wallet Hack Fallout as CEO Reveals Reimbursement Plan for Affected Users

Trust Wallet Hack Fallout as CEO Reveals Reimbursement Plan for Affected Users

  • Trust Wallet outlines refund steps as users seek clarity after extension breach
  • CEO confirms official dashboard while warning users against rising compensation scams
  • Investigation continues as security flaws raise concerns over browser wallet safety

Trust Wallet has begun addressing user losses following a security breach tied to its Google Chrome extension, according to a public update from CEO Eowyn Chen. The announcement has shifted attention from uncertainty toward recovery, as affected users now have a defined path to seek reimbursement.


According to Chen, the company has activated an official reimbursement dashboard created specifically for users whose funds were drained. This move comes amid heightened concern across the crypto space, as the incident involved a trusted self custody wallet within the Binance ecosystem.


Notably, the reimbursement process has been designed to remain straightforward. According to the CEO’s statement, users only need to submit essential details connected to the compromised wallets, avoiding unnecessary friction during claims. Affected users must provide their email address, the wallet address that was compromised, and the attacker’s wallet address. Additionally, users are required to include transaction hashes linked to the unauthorized transfers.


Moreover, applicants must state the total amount lost using figures and specify a newly created wallet address for compensation. Chen advised users to avoid reusing old wallets, emphasizing caution during the recovery phase.


Beyond reimbursement logistics, Trust Wallet has also started collecting information related to users’ countries of residence. According to the company, this data will support potential legal and criminal proceedings targeting those responsible for the attack.


Also Read: Ethereum Faces Historic Monthly Loss as Clock Ticks on Last 96-Hour Rebound


Security concerns deepen as investigation continues

Meanwhile, questions remain around how the malicious code reached the official Chrome extension release. According to earlier disclosures referenced by Chen, attackers injected harmful JavaScript into version 2.68 of the extension, enabling the interception of user seed phrases.


Consequently, any user who accessed the wallet through the compromised extension became exposed to immediate risk. Once attackers obtained seed phrases, they were able to drain funds without additional approvals. Furthermore, industry observers have pointed to a possible leak of publishing credentials or API keys tied to the Chrome extension update process. However, Trust Wallet has not confirmed this scenario, and investigations are still ongoing.


Importantly, Trust Wallet warned users to remain alert to impersonation scams. According to Chen, the legitimate reimbursement initiative never requests passwords, private keys, or recovery phrases under any circumstances.


Additionally, the company stressed that all compensation claims must be submitted only through the official dashboard. Any external links or unsolicited messages claiming to offer reimbursement should be treated as fraudulent.


The incident has added to broader concerns surrounding browser based crypto wallets and supply chain security. As self custody tools continue to grow, the integrity of update mechanisms remains a critical issue for the sector.


While Trust Wallet works through reimbursements, the company continues its internal review of extension security. According to Chen, strengthening release safeguards has become an immediate priority. For affected users, the reimbursement roadmap now provides clarity during a turbulent period. However, the full scope of the breach and its technical origin remains under investigation as the situation continues to unfold.


Also Read: XRP Price Prediction 2025–2029: Can XRP Break Above $2.00 Soon?