Malicious “Safery” Chrome Wallet Steals Ethereum Seed Phrases

  • A malicious Chrome extension named Safery: Ethereum Wallet disguises itself as a secure Ethereum wallet but steals users’ seed phrases.
  • The extension encodes stolen seed phrases into synthetic Sui Blockchain addresses and broadcasts micro-transactions to exfiltrate data.
  • Seed phrase theft occurs without a command-and-control server, allowing the attacker to decode transactions later and access victims’ funds.
  • The extension has been available on the Chrome Web Store since September 29, 2025, and was updated as recently as November 12, 2025.
  • Users should prefer trusted wallet extensions and defenders should scan for suspicious behaviors such as mnemonic encoding and on-chain activity during wallet import.

A harmful Chrome browser extension called Safery: Ethereum Wallet has been discovered, posing as a legitimate tool for managing Ethereum cryptocurrency since its release on September 29, 2025. This extension claims to offer secure wallet management but secretly captures users’ wallet seed phrases, critical credentials that allow access to crypto assets. Despite updates as recent as November 12, 2025, the extension remains available on the Chrome Web Store.

- Advertisement -

The extension operates by encoding seed phrases into counterfeit Sui blockchain wallet addresses, then sending minute transactions of approximately $0.000001 worth of SUI tokens from a threat actor-controlled wallet to those addresses. This method hides sensitive data inside apparently normal blockchain activity without the need for a command-and-control (C2) server. According to security researcher Kirill Boychenko, this technique enables attackers to monitor the blockchain for these transactions and later decode the recipient addresses to reconstruct stolen seed phrases.

This vector allows threat actors to easily switch blockchain networks and remote procedure call (RPC) endpoints, complicating detection efforts that rely on monitoring specific domains, URLs, or extension IDs. Security analysts at Koi Security detailed how the extension sends micro-transactions to fake addresses to steal users’ mnemonic phrases and subsequently drain victims’ funds.

To mitigate risks, users are advised to use well-known and trusted wallet extensions. Security professionals are encouraged to detect and block extensions that generate synthetic blockchain addresses, encode mnemonics, or conduct unauthorized on-chain operations during wallet creation or import. Boychenko emphasizes treating unexpected blockchain RPC calls in browsers as high-risk signals, particularly when extensions advertise support for only a single blockchain network.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

- Advertisement -

Previous Articles:

- Advertisement -

Latest News

Hyperscale hits 500k TPS, peaks over 700k in public test

Radix Hyperscale sustained 500,000 transactions per second (TPS) with peaks over 700,000 TPS during...

JPMorgan Projects Gold Skyrocketing to $8,000 by 2030

JP Morgan projects Gold (XAU/USD) could surge to $8,000 by 2030, a prediction following...

Crypto VC Inflows Hit $1.4B Through Early 2026

Institutional and venture capital commitments to crypto companies reached $1.4 billion at the start...

Brazil Sells $61B in US Treasuries, Buys Gold in 2026

Brazil sold $61 billion in U.S. Treasury securities in 2026, using the proceeds to...

U.S. Sanctions Crypto Exchanges Aiding Iran’s Regime

The U.S. Treasury Department has, for the first time, sanctioned entire cryptocurrency exchanges under...
- Advertisement -

Must Read

Top 8 Best Anonymous Web Hosting Companies That Accept Crypto

Nowadays, there is plenty of information about people online, and malicious people use them to carry out inappropriate activities. If you want to keep...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!