🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
After years of crawling and fighting in the industry, I’ve seen many storms, but this time, a hacker incident involving a popular wallet browser extension still sends chills down my spine—an official version turned into an intrusion tool. This blow has awakened many to their reliance on the “security illusion.”
**Timeline: Carefully Crafted Christmas Hijacking**
The story begins on December 8. The hacker registered a spoofed domain api.metrics-trustwallet[.]com and lay in wait for two weeks without action. On December 22, a tampered version v2.68.0 was pushed out through official channels.
By Christmas Day, the fund transfers began. On-chain tracking expert ZachXBT’s monitoring data shows that within just a few days, at least $6 million to $7 million in crypto assets vanished, affecting hundreds of users.
**The Hacker’s True Cleverness**
This isn’t a brute-force server intrusion. The hacker inserted a seemingly harmless PostHog data analytics tool into the code—something wallet companies commonly use in their daily operations. But this tool left a backdoor: when users recharge and reopen the wallet, it quietly steals their mnemonic phrases.
This is a textbook case of supply chain attack. Instead of hacking the server, the attacker poisoned the official distribution channels—tricking users into handing over their private keys to thieves.