Malicious “Safery” Chrome Wallet Steals Ethereum Seed Phrases

  • A malicious Chrome extension named Safery: Ethereum Wallet disguises itself as a secure Ethereum wallet but steals users’ seed phrases.
  • The extension encodes stolen seed phrases into synthetic Sui Blockchain addresses and broadcasts micro-transactions to exfiltrate data.
  • Seed phrase theft occurs without a command-and-control server, allowing the attacker to decode transactions later and access victims’ funds.
  • The extension has been available on the Chrome Web Store since September 29, 2025, and was updated as recently as November 12, 2025.
  • Users should prefer trusted wallet extensions and defenders should scan for suspicious behaviors such as mnemonic encoding and on-chain activity during wallet import.

A harmful Chrome browser extension called Safery: Ethereum Wallet has been discovered, posing as a legitimate tool for managing Ethereum cryptocurrency since its release on September 29, 2025. This extension claims to offer secure wallet management but secretly captures users’ wallet seed phrases, critical credentials that allow access to crypto assets. Despite updates as recent as November 12, 2025, the extension remains available on the Chrome Web Store.

- Advertisement -

The extension operates by encoding seed phrases into counterfeit Sui blockchain wallet addresses, then sending minute transactions of approximately $0.000001 worth of SUI tokens from a threat actor-controlled wallet to those addresses. This method hides sensitive data inside apparently normal blockchain activity without the need for a command-and-control (C2) server. According to security researcher Kirill Boychenko, this technique enables attackers to monitor the blockchain for these transactions and later decode the recipient addresses to reconstruct stolen seed phrases.

This vector allows threat actors to easily switch blockchain networks and remote procedure call (RPC) endpoints, complicating detection efforts that rely on monitoring specific domains, URLs, or extension IDs. Security analysts at Koi Security detailed how the extension sends micro-transactions to fake addresses to steal users’ mnemonic phrases and subsequently drain victims’ funds.

To mitigate risks, users are advised to use well-known and trusted wallet extensions. Security professionals are encouraged to detect and block extensions that generate synthetic blockchain addresses, encode mnemonics, or conduct unauthorized on-chain operations during wallet creation or import. Boychenko emphasizes treating unexpected blockchain RPC calls in browsers as high-risk signals, particularly when extensions advertise support for only a single blockchain network.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

- Advertisement -

Previous Articles:

- Advertisement -

Latest News

Robinhood Crypto Volumes Leap 74% as Bitcoin Holds Strong

Robinhood's crypto trading volume surged 74% YoY in February 2026 to $25.0 billion, despite...

BlackRock’s Ethereum Staking ETF Debuts With $15.5M Volume

BlackRock's new staked Ethereum ETF, ETHB, launched with $15.5 million in trading volume, described...

$50M AAVE Swap Yields $36K Despite Warning

A trader lost nearly $50 million on Thursday after swapping that amount of USDT...

Teamsters Threaten to Block Paramount-WBD Merger

The International Brotherhood of Teamsters opposes the Paramount Skydance-Warner Bros. Discovery merger without enforceable...

STRC Sales Surge, Eye Record Single-Day Bitcoin Buy

A community dashboard tracking Strategy's STRC sales suggests March 12, 2026 could see the...

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...