Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Posted on September 25, 2025September 25, 2025 By CWS

Sep 25, 2025Ravie LakshmananSoftware Safety / Malware
Cybersecurity researchers have found two malicious Rust crates impersonating a legit library referred to as fast_log to steal Solana and Ethereum pockets keys from supply code.
The crates, named faster_log and async_println, have been revealed by the risk actor underneath the alias rustguruman and dumbnbased on Might 25, 2025, amassing 8,424 downloads in complete, in response to software program provide chain safety firm Socket.
“The crates embrace working logging code for canopy and embed routines that scan supply information for Solana and Ethereum non-public keys, then exfiltrate matches by way of HTTP POST to a hardcoded command and management (C2) endpoint,” safety researcher Kirill Boychenko mentioned.
Following accountable disclosure, the maintainers of crates.io have taken steps to take away the Rust packages and disable the 2 accounts. It has additionally preserved logs of the risk actor-operated customers together with the malicious crates for additional evaluation.
“The malicious code was executed at runtime, when operating or testing a challenge relying on them,” Crates.io’s Walter Pearce mentioned. “Notably, they didn’t execute any malicious code at construct time. Besides for his or her malicious payload, these crates copied the supply code, options, and documentation of legit crates, utilizing an analogous identify to them.”

The typosquatting assault, as detailed by Socket, concerned the risk actors retaining the logging performance of the particular library, whereas introducing malicious code modifications throughout a log packing operation that recursively searched Rust information (*.rs) in a listing for Ethereum and Solana non-public keys and bracketed byte arrays and exfiltrate them to an Cloudflare Employees area (“mainnet.solana-rpc-pool.staff[.]dev”).
In addition to copying fast_log’s README and setting the bogus crates’ repository subject to the true GitHub challenge, the usage of “mainnet.solana-rpc-pool.staff[.]dev” is an try and mimic Solana’s Mainnet beta RPC endpoint “api.mainnet-beta.solana[.]com.”

In accordance with crates.io, the 2 crates didn’t have any dependent downstream crates, nor did the customers publish different crates on the Rust package deal registry. The GitHub accounts linked to the crates.io writer accounts stay accessible as of writing. Whereas the GitHub account dumbnbased was created on Might 27, 2023, rustguruman didn’t exist till Might 25, 2025.
“This marketing campaign exhibits how minimal code and easy deception can create a provide chain danger,” Boychenko mentioned. “A useful logger with a well-recognized identify, copied design, and README can move informal assessment, whereas a small routine posts non-public pockets keys to a risk actor-controlled C2 endpoint. Sadly, that is sufficient to attain developer laptops and CI.”

The Hacker News Tags:Confirmed, Crates, Downloads, Ethereum, Keys, Malicious, Rust, Solana, Steal

Post navigation

Previous Post: New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic
Next Post: Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Related Posts

Why Executives and Practitioners See Risk Differently Why Executives and Practitioners See Risk Differently The Hacker News
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE The Hacker News
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks The Hacker News
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks The Hacker News
GlassWorm Attack Exploits Open VSX Extensions to Target Developers GlassWorm Attack Exploits Open VSX Extensions to Target Developers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark