China-based fake cybersecurity firm exposed in $7M crypto wallet supply-chain heist
A supposed security company in China has been unmasked as the front for a sophisticated crypto theft ring that allegedly siphoned off around 7 million dollars by compromising wallet supply chains. Operating under the corporate name Wuhan Anshun Technology, the group presented itself as a legitimate cybersecurity outfit while, according to leaked internal accounts, running a parallel operation to steal user funds from popular wallets, including Trust Wallet.
The exposure did not come from law enforcement or external researchers, but from within. An internal dispute over how the stolen money was divided reportedly escalated into a full-blown conflict, prompting one member of the team to leak technical and operational details of the scheme. That whistleblower claims to have participated in the operation, then turned against the group after what they describe as unfair profit sharing and unpaid severance.
Publicly, Wuhan Anshun positioned itself as a company specializing in vulnerability research, red-team and blue-team security exercises, and broader network defense services. Internally, however, the team allegedly pursued what it called “gray market” business: systematically capturing mnemonic phrases, monitoring them at scale, and draining wallets whenever balances became attractive.
According to the leaked testimony, the group built custom tooling to automate the process. Their tools scanned mnemonic phrases linked to wallets across multiple blockchains, including Ethereum, BNB Chain, Arbitrum, and others. By continuously checking these addresses, the system flagged high‑value portfolios and queued them for theft once the balances crossed predetermined thresholds.
The attack strategy reportedly hinged on corrupting the software that stands between users and their private keys. The group is said to have targeted Electron-based desktop clients, as well as browser wallet plugins, inserting backdoors or malicious components into the software supply chain. Through a combination of reverse engineering, tampered builds, and remote-control utilities, they were allegedly able to harvest wallet data and exfiltrate recovery phrases or keys.
Once access was secured, the theft process became largely mechanical. The leak describes flows in which the attackers drained funds from compromised wallets into intermediate addresses, then fragmented the assets across numerous accounts and chains. In total, the operation is said to have touched at least 37 different token types across several networks. This fragmentation and repeated transferring were designed to frustrate tracking efforts and make on-chain forensics far more difficult.
The whistleblower’s account suggests that the scheme unraveled over money rather than morality. They claim the team leader controlled the primary wallets holding stolen funds and dictated how profits were split, allegedly refusing to pay a promised severance package when one operator tried to step away. In response, the disgruntled member says they decided to publish evidence of the campaign and has indicated an intention to surrender to authorities.
As of now, no regulator or law enforcement body has publicly confirmed the full scope of the allegations or provided detailed updates on any investigation. Still, security analysts point out that, even if individual claims remain unverified, the scenario fits a broader, well-documented pattern: attackers increasingly use software supply chains, plugins, and third-party clients as leverage points to reach user keys without directly attacking blockchains themselves.
For everyday crypto holders, the case is a stark reminder that security risk is not confined to private key storage or hardware wallets. Every dependency in the stack matters: the desktop app you download, the browser extension you install, the auto-update mechanism you don’t think about, and the closed-source components you never audit. Any one of these can become the weak link that turns a secure key into a compromised one.
Institutional players are not immune either. Trading firms, funds, and custodial platforms often rely on a complex ecosystem of plugins, internal tooling, and integrated clients. A seemingly innocuous Electron app used for monitoring, or a convenience extension installed by a staff member, can create an entry point for attackers who understand both the technology and the workflow. In high-value environments, a single compromised endpoint can cascade into multi-million dollar losses.
The alleged Wuhan Anshun operation also highlights a growing trend: attackers masquerading as defenders. By branding themselves as a cybersecurity company, the group could market its “expertise,” potentially partner with other firms, and gain access to tools, networks, and information that ordinary criminals would struggle to obtain. This blur between offensive security research and outright theft complicates due diligence processes for companies looking to hire external security providers.
One of the most worrying aspects of supply-chain attacks is how invisible they can be to ordinary users. A wallet extension may look, install, and function exactly as expected, while a malicious update silently redirects backup phrases, logs keystrokes, or injects code that only executes under certain conditions. Even advanced users can be fooled if the compromise occurs upstream, at the level of build servers, dependency packages, or compromised developer accounts.
In this environment, “basic” best practices begin to look outdated. Minimalism is increasingly a security strategy:
– Install as few wallet plugins and extensions as possible.
– Favor well-audited, widely scrutinized software over obscure tools, even if the latter promise extra features.
– Disable automatic installation of unverified updates where feasible and practical.
– Isolate devices used for large holdings from routine browsing, messaging apps, and experimental software.
For organizations, the bar is even higher. Rigorous supply-chain auditing, code-signing verification, internal security reviews of wallet integrations, and separation of duties for key management should be treated as mandatory controls, not optional upgrades. Security teams need to track not only which wallets are in use, but also which libraries, clients, and plugins those wallets depend on. Routine penetration tests should explicitly include attempts to compromise supply chains, not just front-end logins or network perimeters.
User education also has to evolve. Many guides still focus almost exclusively on seed phrase backups and phishing sites, which, while important, are only part of the threat model. Training should explain how a trusted-looking update, a cloned “security tool,” or a convenience plugin can undermine an otherwise strong self-custody setup. Awareness campaigns need to emphasize the idea that every piece of software between you and your keys is effectively part of your wallet.
Regulators and policymakers will likely see this case as another example of why the security of crypto infrastructure cannot be left purely to market forces. While overregulation can stifle innovation, a complete absence of standards around wallet software lifecycle, update mechanisms, and disclosure of security practices leaves users exposed. Future frameworks may require more transparency about how wallet providers manage their own supply chains, verify third-party code, and respond to suspected compromises.
Technically, defending against this class of attack is difficult but not impossible. Open-source development with reproducible builds, independent code reviews, strict access control to build pipelines, and hardware-backed signing for releases all reduce opportunities for tampering. Users who can compile from verified source or rely on multiple independent verifications of a build gain an extra layer of assurance that what they install matches what developers intended.
The alleged 7 million dollar theft is modest compared with some high-profile exchange hacks, but the method is what worries professionals most. Blockchains themselves remain relatively hard to attack; the surrounding software ecosystem, by contrast, is sprawling, inconsistent, and riddled with small trust assumptions that attackers can exploit. Each successful campaign teaches criminals what works and encourages copycats to refine and replicate these tactics.
Ultimately, the episode serves as a warning for the next phase of crypto adoption. As more capital flows into self-custody and non-custodial services, attackers will keep shifting focus from obvious targets like centralized exchanges to subtler chokepoints such as wallet supply chains, developer toolchains, and third-party integrations. Users and institutions that treat security as a one-time setup task, rather than an ongoing process, will remain prime targets.
In that sense, the takeaway is clear: controlling your keys does not automatically mean controlling your risk. Real security in crypto now requires understanding and hardening the entire path between your transactions and the software that signs them – from the first download to the latest update.

