SlowMist reports a TRON wallet phishing campaign using a fake Chrome extension and remote phishing pages to steal credentials, featuring anti-analysis tools, geoSlowMist reports a TRON wallet phishing campaign using a fake Chrome extension and remote phishing pages to steal credentials, featuring anti-analysis tools, geo

SlowMist Reports Advanced TRON Wallet Phishing Attack With Chrome Extension Impersonation And Remote Iframe Loading

2026/05/11 20:21
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다
SlowMist Reports Advanced TRON Wallet Phishing Attack With Chrome Extension Impersonation And Remote Iframe Loading

Threat intelligence firm SlowMist reported that it has identified a high-risk phishing campaign aimed at TRON wallet users, involving a malicious Chrome MV3 extension designed to impersonate the Threat intelligence firm SlowMist reported that it has identified a high-risk phishing campaign aimed at TRON wallet users, involving a malicious Chrome MV3 extension designed to impersonate the TronLink Wallet brand. 

According to the analysis, the attack combines deceptive branding, remotely loaded user interfaces, and data-exfiltration mechanisms in a layered structure intended to capture wallet credentials while reducing the likelihood of detection during review.

The first stage of the campaign centers on a fraudulent browser extension that mimics a legitimate TRON-related tool. SlowMist said the extension relies on Unicode bidirectional control characters and Cyrillic homoglyphs to make its name appear similar to the official TronLink label. Although the package itself presents as a low-permission extension, its behavior changes after installation. When the user opens the popup, the extension checks a remote endpoint and, if available, loads a full interface from an external iframe rather than relying on a static local page.

That remote component forms the second stage of the operation. The phishing site closely imitates the look and function of the TronLink web wallet, including the pages used to import mnemonic phrases, private keys, and keystore files. SlowMist said the interface collects sensitive information such as recovery phrases, private keys, keystore data, and passwords, then forwards it through server-side APIs to attacker-controlled infrastructure. The report indicated that the data is relayed in real time through the Telegram Bot API.

The extension also stores several local markers, including information about whether the remote service is reachable, the URL used for the iframe, and recent search records. SlowMist noted that these items can remain in local storage until the extension is removed. Because the visible popup content is pulled from a remote source, the malicious behavior can be changed without modifying the extension package itself, complicating static analysis and conventional store review procedures.

Inside TRON Phishing Campaign: Anti-Analysis Techniques, Geo-Targeting, And Multi-Layer Attack Architecture

According to the report, the phishing page includes additional safeguards meant to hinder investigation. These measures include blocking right-click actions, disabling text selection, intercepting developer tools shortcuts, suppressing console output, preventing dragging, and blocking print commands. The page also tracks visitor behavior and checks whether a session should be blocked, redirecting suspicious traffic to a blank page. SlowMist said these controls are intended to frustrate sandbox testing and automated inspection.

The analysis further described geographic filtering logic, with users detected from Russian-language settings or Russian time zones being redirected to a separate domain. SlowMist interpreted this behavior as either region-specific phishing handling or an attempt to avoid attention from local investigators. The main infrastructure was identified as a remote domain hosted on Vercel, while other legitimate TRON ecosystem services embedded in the code were described as part of fallback or query functionality rather than malicious activity.

SlowMist characterized the operation as a two-layer attack model in which a deceptive browser extension acts as the initial contact point while a remotely controlled web page carries out the actual credential theft. The company said this design illustrates how malicious actors can separate visible shell components from hidden backend behavior, making the campaign harder to identify through routine static checks alone. 

The warning was issued as a reminder for users and security teams to treat unauthorized extensions with caution, review installed browser add-ons, and monitor for unusual traffic tied to wallet-import workflows and related phishing infrastructure.

The post SlowMist Reports Advanced TRON Wallet Phishing Attack With Chrome Extension Impersonation And Remote Iframe Loading appeared first on Metaverse Post.

SPACEX(PRE) Launchpad Is Live

SPACEX(PRE) Launchpad Is LiveSPACEX(PRE) Launchpad Is Live

Start with $100 to share 6,000 SPACEX(PRE)

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

No Chart Skills? Still Profit

No Chart Skills? Still ProfitNo Chart Skills? Still Profit

Copy top traders in 3s with auto trading!