Socket warns of malicious Chrome Ethereum wallet extension stealing seeds

  • Safery: Ethereum Wallet is a malicious Chrome extension designed to steal crypto seed phrases.
  • It covertly encodes seed phrases into fake blockchain addresses and sends microtransactions to expose users’ private data.
  • The extension ranks fourth in Google Chrome search results for “Ethereum Wallet,” alongside legitimate wallets.
  • Users creating or importing wallets through the extension risk immediate fund theft as scammers reconstruct their seed phrases.
  • Warning signs include zero reviews, grammatical errors, no official website, and developer contact via Gmail.

A new crypto wallet extension named Safery: Ethereum Wallet on Google’s Chrome Web Store has been identified as a security threat that steals users’ seed phrases. The extension, which claims to provide secure Ethereum asset management, uses a hidden mechanism to send sensitive data to attackers. This issue was detailed in a recent report by Socket.

- Advertisement -

The extension secretly encodes BIP-39 mnemonic seed phrases into synthetic blockchain addresses on the Sui network and broadcasts microtransactions to these addresses. These transactions appear normal but allow the threat actor to recover the original seed phrases and access wallets. According to the report, “By decoding the recipients, the threat actor reconstructs the original seed phrase and can drain affected assets. The mnemonic leaves the browser concealed inside normal-looking blockchain transactions.”

Safery: Ethereum Wallet appears as the fourth result when users search for “Ethereum Wallet” on the Chrome Web Store, trailing behind well-known options like MetaMask, Wombat, and Enkrypt. Users can either create new wallets or import existing ones, both of which expose their seed phrases to the attackers immediately.

If a new wallet is created, the seed phrase is sent to the scammers right away through the encoded Sui transactions, allowing instant access to funds. In cases where users import an existing wallet, their entered seed phrase is similarly transmitted to the threat actor. The extension performs these actions using a hardcoded cryptographic key controlled by the attacker.

Several indicators signal the extension’s illegitimacy, such as zero user reviews, limited branding, grammatical errors, no official website, and a developer contact listed as a Gmail address. Users are advised to thoroughly research blockchain tools, exercise caution with seed phrases, and prefer trusted wallet options. Monitoring wallet transactions closely is also recommended, as even minor, unexpected blockchain transactions may indicate fraudulent activity.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Iranians Flee Exchanges After Airstrikes

Outflows from Iranian crypto exchanges surged to $10.3 million after recent U.S.-Israel airstrikes, with...

X penalizes AI war content creators

Creators on platform X face 90-day revenue-sharing suspensions for posting undisclosed AI-generated war footage.The...

Oil Prices Soar as Strait of Hormuz Closed After Strikes

The Strait of Hormuz, a vital oil chokepoint, has been effectively shut since U.S.-Israeli...

Polymarket Kills Nuclear Bet Market Amid Backlash

Polymarket removed a controversial market allowing users to bet on whether a nuclear weapon...

Bitcoin Holds Firm at $68K Amid Global Market Downturn

On Tuesday night, global markets faced volatility due to the military conflict in the...

Must Read

A Beginner’s Guide To Cryptocurrency Mining

Cryptocurrency is considered one of the most popular forms of financial assets today. Many of these digital assets operate within blockchain technology which works...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!