Malicious “Safery” Chrome Wallet Steals Ethereum Seed Phrases

  • A malicious Chrome extension named Safery: Ethereum Wallet disguises itself as a secure Ethereum wallet but steals users’ seed phrases.
  • The extension encodes stolen seed phrases into synthetic Sui Blockchain addresses and broadcasts micro-transactions to exfiltrate data.
  • Seed phrase theft occurs without a command-and-control server, allowing the attacker to decode transactions later and access victims’ funds.
  • The extension has been available on the Chrome Web Store since September 29, 2025, and was updated as recently as November 12, 2025.
  • Users should prefer trusted wallet extensions and defenders should scan for suspicious behaviors such as mnemonic encoding and on-chain activity during wallet import.

A harmful Chrome browser extension called Safery: Ethereum Wallet has been discovered, posing as a legitimate tool for managing Ethereum cryptocurrency since its release on September 29, 2025. This extension claims to offer secure wallet management but secretly captures users’ wallet seed phrases, critical credentials that allow access to crypto assets. Despite updates as recent as November 12, 2025, the extension remains available on the Chrome Web Store.

- Advertisement -

The extension operates by encoding seed phrases into counterfeit Sui blockchain wallet addresses, then sending minute transactions of approximately $0.000001 worth of SUI tokens from a threat actor-controlled wallet to those addresses. This method hides sensitive data inside apparently normal blockchain activity without the need for a command-and-control (C2) server. According to security researcher Kirill Boychenko, this technique enables attackers to monitor the blockchain for these transactions and later decode the recipient addresses to reconstruct stolen seed phrases.

This vector allows threat actors to easily switch blockchain networks and remote procedure call (RPC) endpoints, complicating detection efforts that rely on monitoring specific domains, URLs, or extension IDs. Security analysts at Koi Security detailed how the extension sends micro-transactions to fake addresses to steal users’ mnemonic phrases and subsequently drain victims’ funds.

To mitigate risks, users are advised to use well-known and trusted wallet extensions. Security professionals are encouraged to detect and block extensions that generate synthetic blockchain addresses, encode mnemonics, or conduct unauthorized on-chain operations during wallet creation or import. Boychenko emphasizes treating unexpected blockchain RPC calls in browsers as high-risk signals, particularly when extensions advertise support for only a single blockchain network.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

- Advertisement -

Previous Articles:

- Advertisement -

Latest News

Idle GPUs Key to Easing AI Compute Crunch

GPU prices for AI workloads have surged dramatically, with the NVIDIA RTX 5090 up...

Base Ditches Optimism, AI Exploits Surge

Base, founded by Coinbase, is leaving the Optimism stack to build its own chain,...

Bitcoin Whales Amass Holdings While Exchange Outflows Spike

Large Bitcoin holders, or "whales," have rebuilt their reserves to levels last seen before...

MSTR Rebounds as Bitcoin Holds Above $67,000

MicroStrategy stock is up 8% this week to $132, signaling a potential rebound after...

Bitcoin surges after Supreme Court limits Trump tariffs

The Supreme Court ruled that most of President Donald Trump's tariffs were imposed by...

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!