Trust Wallet Discord short link hijacked; ZachXBT urgently warns: do not click

MarketWhisper
ETH-2,2%
BNB-1%
OP-4,21%
ARB-5,67%

Trust Wallet短連結遭劫持

On April 2, on-chain detective ZachXBT issued an urgent warning: the official Trust Wallet Discord short link discord[.]gg/trustwallet has been hijacked by an attacker and is currently pointing to a malicious phishing server. ZachXBT specifically advises users to avoid joining the Discord community via any links provided through official channels until the issue is resolved.

Discord Hijacking Alert: Emergency Protection Measures Users Need to Take Immediately

Trust Wallet Discord (Source: ZachXBT)

The official Trust Wallet Discord short link has been hijacked, meaning that all users who bookmarked this link or obtained it through any official or unofficial channel may, after clicking, end up on a phishing server disguised as the Trust Wallet community.

Common attack patterns of phishing servers include: impersonating official administrators to要求 users to submit a seed phrase or private key; sending “official security announcements” containing malicious links; and simulating Trust Wallet emergency upgrade prompts to诱导 users to take action. At present, users should immediately take the following steps:

Stop clicking on every existing link: No matter whether the source is the Trust Wallet official website, Telegram, a blog, or any other third-party channel, only get the latest security announcements and the correct links through the app or a verified X account

Wait for official confirmation: Do not re-join until Trust Wallet officially announces that the Discord link has been restored to safety

If you have entered any sensitive information: Immediately transfer your assets to a new wallet and regenerate your seed phrase

Address Poisoning Protection Going Live: Full Coverage of 32 EVM Chains

On the same day that the Discord hijacking incident broke out, Trust Wallet announced the launch of an address poisoning attack real-time protection feature, adding an in-app interface element with a proactive screening mechanism: the system will automatically compare target addresses against a database, and once it matches known scam addresses or look-alike spoof addresses, it will immediately alert the user to block potentially malicious transactions.

The initial supported scope covers 32 EVM-compatible blockchains, including major networks such as Ethereum, BNB Smart Chain, Polygon, Optimism, Arbitrum, Avalanche, and Base.

According to Trust Wallet data, address poisoning attacks have already occurred more than 225 million times, with confirmed losses totaling $500 million. In the past two major cases, one investor lost $50 million in USDT in December 2025; and two other investors together lost $62 million. These losses prompted Binance former CEO Changpeng Zhao (CZ) to publicly criticize, saying: “All wallets should simply check whether the receiving address is a malicious address and ban users—this is only a blockchain query.”

A String of Security Challenges for Trust Wallet Since 2025

This Discord hijacking incident is not isolated. On December 24, 2025, Trust Wallet’s Chrome browser extension was attacked, causing users to lose roughly $7 million; Trust Wallet urgently released a patched version and promised compensation to affected users. Currently, competing products such as Rabby Wallet, Zengo Wallet, and Phantom Wallet have already provided similar malicious transaction pre-filtering functions. Trust Wallet’s introduction of address poisoning protection is a direct response to industry pressure.

Frequently Asked Questions

After the Trust Wallet Discord is hijacked, how can I safely get the correct community invite link?

Before Trust Wallet officially confirms that the Discord link is safe again, it is recommended to obtain the latest Discord invite link through Trust Wallet’s official pages within the app, or through the verified official Trust Wallet X (Twitter) account. Avoid using any saved old links or links from third-party channels.

How does the address poisoning attack work specifically, and how can users protect themselves?

The attacker first sends a small transaction to the victim, causing the phishing address to appear in the victim’s transaction history; when the victim transfers funds next time, they may copy this look-alike malicious address from the history, leading to funds being sent to the attacker’s account. Protection methods: always manually enter the address or copy it only from trusted addresses; never copy an address from transaction history; and ensure you use a wallet version that already includes address screening functionality.

Has the 2025 security incident involving the Trust Wallet Chrome extension been fully resolved?

After the extension attack on December 24, 2025, Trust Wallet released a new version that removes the malicious code and promised compensation to affected users. It is recommended that all users confirm the Trust Wallet extension has been updated to the latest version, and verify the legitimacy of the source through the official page in the Chrome Web Store.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Rhea Finance Suffers a $18.4 Million Loss After an Oracle Attack: ZachXBT Warns, Tether Freezes 4.34 Million USDT, and the Attacker Returns Some Funds

Rhea Finance suffered an oracle manipulation attack on the NEAR Protocol, with losses reaching $18.4 million—double the initial estimate. The attacker manipulated the pricing of a fake token, causing collateral valuations to be incorrect. Tether froze about $4.34 million in USDT; the attacker returned roughly $3.5 million. To date, more than $7.8 million has been recovered, highlighting the importance of oracle security.

ChainNewsAbmedia5h ago

eth.limo DNS Under Attack, Vitalik Urges Users to Pause Access and Switch to IPFS

Vitalik Buterin warned on April 18 about an attack on the DNS registrar for eth.limo, urging users to avoid accessing vitalik.eth.limo and related pages. He recommended using IPFS as an alternative until the issue is resolved.

GateNews5h ago

Sanctioned Exchange Grinex Hit by $13.7M Hack; Blames Foreign Intelligence Services

Grinex, a sanctioned crypto-ruble exchange, has halted operations due to a cyberattack that stole over $13.74 million in USDT. The attack is believed to involve state-level actors aiming to destabilize Russia's financial system. Grinex is cooperating with law enforcement but has no timeline for resuming services.

Coinpedia13h ago

Figure Faces Short Seller Accusations Over Blockchain Integration Claims; FIGR Stock Down 53% From January Peak

Figure Technology Solutions faced allegations from Morpheus Research of overstating its blockchain technology use, resulting in a significant drop in share prices. Figure defended its operations, highlighting its digital asset features and strong performance metrics.

GateNews20h ago

Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam

Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.

GateNews04-17 12:11

SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software

SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.

GateNews04-17 11:46
Comment
0/400
No comments