Beware: Fake Chrome Extension ‘Safery’ Steals Ethereum Wallet Seeds via Sui Blockchain

Published:

spot_img

Beware of Malicious Chrome Extension Masquerading as an Ethereum Wallet

What’s Happening?

Recent findings from cybersecurity experts have unveiled a deceptive Chrome extension that pretends to be a legitimate Ethereum wallet but is, in fact, a sophisticated piece of malware. Named “Safery: Ethereum Wallet,” this extension has made its way into the Chrome Web Store, claiming to be a secure solution for managing Ethereum cryptocurrency, complete with flexible settings. It was first uploaded on September 29, 2025, and received its most recent update on November 12. Alarmingly, it remains available for users to download.

The Deceptive Mechanics Behind Safery

The malicious behavior of this extension primarily revolves around the theft of users’ wallet seed phrases. Kirill Boychenko, a researcher at Socket, explained that while marketed as a straightforward Ethereum wallet, the extension discreetly integrates a backdoor to extract sensitive information. This is achieved by encoding the seed phrases into Sui addresses and then facilitating microtransactions from a wallet controlled by the threat actor.

How It Works

The malware embedded within the browser extension targets wallet mnemonic phrases. It accomplishes this by converting the seed phrases into fictitious Sui wallet addresses. Subsequently, it executes tiny transactions—0.000001 SUI—directed from a pre-set, hacker-controlled wallet.

The core strategy behind this malware is to disguise the theft of seed phrases within ostensibly ordinary blockchain transactions. By eliminating the need for a command-and-control (C2) server to retrieve this data, the attackers can efficiently send and collect information without raising immediate suspicion. Once the transaction processes, hackers can decode the recipient addresses to recover the original seed phrases, thereby allowing them to drain assets associated with the compromised wallets.

Security Analysis and Recommendations

In their assessment, Koi Security delineates how the extension’s operations facilitate the theft of seed phrases. By encoding these phrases into fake Sui addresses and monitoring blockchain activity, the hackers craftily siphon off funds from unwitting victims’ wallets.

To mitigate the risks posed by this fraudulent extension, cybersecurity experts recommend that users only utilize wallet extensions from reputable sources. Additionally, security teams should perform thorough scans on extensions to identify mnemonic encoders, synthetic address generators, and any hard-coded seed phrases. Blocking extensions that write on the blockchain during wallet creation or import is also advisable.

A Growing Threat Landscape

Boychenko underscores the evolving tactics that cybercriminals employ to bypass detection: “This technique allows threat actors to switch chains and RPC endpoints effortlessly. Therefore, traditional detections that depend on domains, URLs, or specific extension IDs may not catch these threats.” He advises treating any unexpected blockchain RPC calls from a browser—especially from products that claim to be single-chain—as significant indicators of potential malicious activity.

Conclusion

As cyber threats continue to evolve, awareness and vigilance are more critical than ever. Users are encouraged to be cautious when choosing browser extensions, particularly those related to cryptocurrency, and to stay informed about the latest security advisories. By prioritizing trusted resources and maintaining a healthy skepticism towards newer or lesser-known tools, individuals can better protect themselves from sophisticated online threats.

spot_img

Related articles

Recent articles

Oman Welcomes Wind Turbines for PDO’s Riyah 1 and 2 Projects

OQ Alternative Energy Welcomes First Wind Turbines for Riyah Projects MUSCAT: OQ Alternative Energy (OQAE), a subsidiary of OQ and recognized as the national leader...

Massive Spam Attack Targets npm Registry with Over 43,000 Fake Packages

Understanding the IndonesianFoods Worm: A Large-Scale npm Spam Campaign The Rise of the IndonesianFoods Spam Campaign Recent investigations by security researchers have brought to light a...

Amazon Confirms APT Group Targets Cisco and Citrix with Zero-Day Vulnerabilities

markdown Unveiling a Cyber-Espionage Campaign: Amazon's Insights Amazon's threat intelligence team has shed light on a sophisticated cyber-espionage effort orchestrated by an advanced persistent threat (APT)...

ED Targets Industrialist Vikas Garg in ₹190 Crore Customs Duty Scandal

MUMBAI: The case, involving a Mumbai-based trading firm and Delhi businessman Vikas Garg, has drawn in multiple agencies, including the CBI and...