Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
DeFi News

Fake TronLink Extension Targets TRON Users in Phishing Scam

Attackers used Unicode spoofing and fake Chrome trust signals to make a malicious TronLink extension appear legitimate and bypass detection checks.

Written By:
Kenrodgers Fabian

Reviewed By:
Divya Mistry

Last updated: 50 minutes ago
Published 50 minutes ago
Share
Last updated: 50 minutes ago
Published 50 minutes ago
Fake TronLink Extension Targets TRON Users in Phishing Scam
Show AI Summary
SlowMist detects phishing campaign targeting TRON users via fake browser extensions
Attackers exploit Chrome’s listing system to make fake TronLink extension appear legitimate
Cybercriminals use advanced tactics to disguise and update phishing content without detection

Security firm SlowMist has warned TRON users about a phishing campaign targeting browser wallet extensions that steal crypto wallet data. The firm said it detected the activity through its MistEye monitoring system after spotting unusual extension behavior and signs of remote data theft.

As per an analysis by the firm, the fake extension appears on the Chrome Web Store as a Chrome MV3 (Manifest V3) extension version of TronLink, which helps it avoid early detection. After installation, it loads a remote interface that closely imitates the official wallet. Users then enter private keys, mnemonic phrases, and passwords into a page controlled by attackers. The information is then sent out immediately through automated systems.

Advanced multi-layer phishing chain targets wallet users

SlowMist said attackers used Unicode characters and Cyrillic letters to disguise the extension name, making it appear legitimate. They also exploited Chrome’s listing system to inherit trust signals such as high ratings and install counts. This reduced suspicion during installation. In addition, the extension requested only basic permissions, which helped it pass early security checks.

The real attack began after installation. The extension loaded a remote iframe that fully replaced the wallet interface. It also switched between local and remote servers to avoid detection. This allowed attackers to update phishing content without changing the extension itself. As a result, standard security scans failed to capture the full attack chain.

The phishing page closely copied the official TronLink wallet interface. Users then entered mnemonic phrases, private keys, and keystore files into the fake system. The data moved instantly to attacker-controlled servers and Telegram bots. The page also blocked right-click actions, developer tools, and other inspection tools to prevent analysis.

Wider pattern of crypto extension attacks

This incident reflects a broader trend of malicious browser extensions targeting crypto users. Similar cases have previously hit platforms such as Trust Wallet and other wallet tools, with losses running into millions of dollars. Past campaigns, including “Extension Hollowing,” also relied on trusted extension listings before turning them into attack vectors.

Security experts urge caution when installing wallet-related browser extensions. They say users should check official extension IDs before installing anything and avoid interacting with suspicious wallet prompts. They also advise removing any unknown extensions and moving funds immediately if there is a chance that login details or private keys were exposed.

Also Read: INK Finance Exploited on Polygon, $140K USDT Drained in Flash Loan Attack

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Crypto ScamTron (TRX)
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Fabian is Crypto Journalist at The Crypto Times
By Kenrodgers Fabian
Follow:
Kenrodgers Fabian is a Content Writer with over 3 years of experience in crypto news, data analysis, and IT. With a degree in Health Records and Information Technology, he brings a structured and analytical approach to digital reporting. Kenrodgers focuses on delivering accurate, informative content that helps readers stay updated on the latest trends in crypto and emerging technologies.
Divya Mistry - Content Editor at The Crypto Times
By Divya Mistry
Follow:
Divya Mistry is a Content Editor with over 9 years of experience in news, PR, marketing, and research. Armed with a Master’s Degree in English Literature from the University of Mumbai, she specializes in crafting and refining long-form content across digital and print platforms. Over the years, Divya has contributed to and shaped content for leading brands across a range of industries, including real estate, healthcare, vertical transport, entertainment, lifestyle, education, EdTech, tech, and finance. Her research work has been featured on platforms like DNA India, Forbes, and Elevator World India. She now brings her editorial and research skills to explore the rapidly evolving world of cryptocurrency.

Latest News

SEC Delays Prediction Market ETFs Seeking More Disclosure Time
SEC Hits Pause on Prediction Market ETFs for Second Time in Two Weeks
Coinbase’s Brutal Week 14% Layoffs, $394M Q1 Loss & AWS Outage
Coinbase’s Brutal Week: 14% Layoffs, $394M Q1 Loss & AWS Outage
OSMO, BUILDon, TROLL, MOVE, SAGA, & ASTEROID
Altcoin Rotation Picks Up: OSMO, BUILDon, TROLL, MOVE, SAGA, & ASTEROID 
SUI Surges 37% in a Week as $143M Institutional Staking Drains Supply
SUI Surges 37% in a Week as $143M Institutional Staking Drains Supply
Crypto Fund Inflows Surge to $857M as CLARITY Act Markup Looms
Crypto Fund Inflows Surge to $857M as CLARITY Act Markup Looms

Find Us on Socials

You may also like

INK Finance Exploited on Polygon, $140K USDT Drained in Flash Loan Attack

INK Finance Exploited on Polygon, $140K USDT Drained in Flash Loan Attack

Singapore Launches Cyber Command to Fight Rising Crypto and Digital Scams 

Singapore Launches Cyber Command to Fight Rising Crypto and Digital Scams 

LayerZero Fallout Pushes $2B Crypto Protocols to Chainlink

LayerZero Fallout Pushes $2B Crypto Protocols to Chainlink

LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake

LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information