Socket warns of malicious Chrome Ethereum wallet extension stealing seeds

  • Safery: Ethereum Wallet is a malicious Chrome extension designed to steal crypto seed phrases.
  • It covertly encodes seed phrases into fake blockchain addresses and sends microtransactions to expose users’ private data.
  • The extension ranks fourth in Google Chrome search results for “Ethereum Wallet,” alongside legitimate wallets.
  • Users creating or importing wallets through the extension risk immediate fund theft as scammers reconstruct their seed phrases.
  • Warning signs include zero reviews, grammatical errors, no official website, and developer contact via Gmail.

A new crypto wallet extension named Safery: Ethereum Wallet on Google’s Chrome Web Store has been identified as a security threat that steals users’ seed phrases. The extension, which claims to provide secure Ethereum asset management, uses a hidden mechanism to send sensitive data to attackers. This issue was detailed in a recent report by Socket.

- Advertisement -

The extension secretly encodes BIP-39 mnemonic seed phrases into synthetic blockchain addresses on the Sui network and broadcasts microtransactions to these addresses. These transactions appear normal but allow the threat actor to recover the original seed phrases and access wallets. According to the report, “By decoding the recipients, the threat actor reconstructs the original seed phrase and can drain affected assets. The mnemonic leaves the browser concealed inside normal-looking blockchain transactions.”

Safery: Ethereum Wallet appears as the fourth result when users search for “Ethereum Wallet” on the Chrome Web Store, trailing behind well-known options like MetaMask, Wombat, and Enkrypt. Users can either create new wallets or import existing ones, both of which expose their seed phrases to the attackers immediately.

If a new wallet is created, the seed phrase is sent to the scammers right away through the encoded Sui transactions, allowing instant access to funds. In cases where users import an existing wallet, their entered seed phrase is similarly transmitted to the threat actor. The extension performs these actions using a hardcoded cryptographic key controlled by the attacker.

Several indicators signal the extension’s illegitimacy, such as zero user reviews, limited branding, grammatical errors, no official website, and a developer contact listed as a Gmail address. Users are advised to thoroughly research blockchain tools, exercise caution with seed phrases, and prefer trusted wallet options. Monitoring wallet transactions closely is also recommended, as even minor, unexpected blockchain transactions may indicate fraudulent activity.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

SEC’s Paul Atkins, CFTC’s Michael Selig to Discuss US Crypto

SEC Chair Paul Atkins and CFTC Chair Michael Selig will hold an event on...

Tesla market share falls to 9.9% in California; Toyota grows

Tesla registrations in California fell to 179,656 in 2025, down from 202,865 the prior...

Capital One to Buy Brex for $5.15B Boosting Business Crypto.

Capital One agreed to buy San Francisco-based Brex in a $5.15 billion stock-and-cash deal.The...

Nasdaq Removes Options Limits on Spot Bitcoin and Ether ETFs

Nasdaq removed 25,000-contract limits on options tied to spot Bitcoin and Ether ETFs.The rule...

AMD rallies on AI one-click bundle, partnerships to $275 Jan

AMD stock has climbed recently and is being positioned to reach $275 by the...
- Advertisement -

Must Read

7 Best Cryptocurrency Lending Platforms in 2025 (Ranked & Reviewed)

QUICK LINKSOur MethodologyHow to Choose the Best Crypto Lending Platform: Key Factors to ConsiderIn-Depth Reviews of the 7 Best Crypto Lending Platforms1. Nexo -...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!