⚠️ Attention Trust Wallet users – a security vulnerability has been identified in the browser extension version 2.68. If you're currently running this version, take action immediately.
Here's what you need to do: Uninstall or disable v2.68 right away and upgrade to v2.69, which includes the security patch. The good news is that mobile app users are unaffected by this issue.
This incident highlights a critical lesson for crypto users: staying vigilant about wallet security matters more than ever. Always keep your extensions updated, monitor your account activity regularly, and consider diversifying your asset management tools based on your specific security needs and use cases.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
13 Likes
Reward
13
3
Repost
Share
Comment
0/400
TommyTeacher
· 8h ago
Oh no, another security vulnerability. This keeps happening every time... Hurry up and upgrade to 2.69, everyone.
View OriginalReply0
AirdropHunterWang
· 8h ago
Damn, another vulnerability appeared. Luckily, I used the mobile version... but I still need to keep an eye on it.
View OriginalReply0
SybilAttackVictim
· 9h ago
Another vulnerability? Trust Wallet's frequency is really impressive. Hurry up and update to v2.69, everyone.
⚠️ Attention Trust Wallet users – a security vulnerability has been identified in the browser extension version 2.68. If you're currently running this version, take action immediately.
Here's what you need to do: Uninstall or disable v2.68 right away and upgrade to v2.69, which includes the security patch. The good news is that mobile app users are unaffected by this issue.
This incident highlights a critical lesson for crypto users: staying vigilant about wallet security matters more than ever. Always keep your extensions updated, monitor your account activity regularly, and consider diversifying your asset management tools based on your specific security needs and use cases.