Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

Posted on November 13, 2025November 13, 2025 By CWS

Nov 13, 2025Ravie LakshmananBrowser Safety / Risk Intelligence
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a reliable Ethereum pockets however harbors performance to exfiltrate customers’ seed phrases.
The title of the extension is “Safery: Ethereum Pockets,” with the risk actor describing it as a “safe pockets for managing Ethereum cryptocurrency with versatile settings.” It was uploaded to the Chrome Net Retailer on September 29, 2025, and was up to date as not too long ago as November 12. It is nonetheless accessible for obtain as of writing.
“Marketed as a easy, safe Ethereum (ETH) pockets, it accommodates a backdoor that exfiltrates seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a risk actor-controlled Sui pockets,” Socket safety researcher Kirill Boychenko stated.

Particularly, the malware current inside the browser add-on is designed to steal pockets mnemonic phrases by encoding them as faux Sui pockets addresses after which utilizing micro-transactions to ship 0.000001 SUI to these wallets from a hard-coded risk actor-controlled pockets.
The tip purpose of the malware is to smuggle the seed phrase inside regular wanting blockchain transactions with out the necessity for establishing a command-and-control (C2) server to obtain the data. As soon as the transactions are full, the risk actor can decode the recipient addresses to reconstruct the unique seed phrase and in the end drain property from it.

“This extension steals pockets seed phrases by encoding them as faux Sui addresses and sending micro-transactions to them from an attacker-controlled pockets, permitting the attacker to watch the blockchain, decode the addresses again to seed phrases, and drain victims’ funds,” Koi Safety notes in an evaluation.
To counter the chance posed by the risk, customers are suggested to stay to trusted pockets extensions. Defenders are advisable to scan extensions for mnemonic encoders, artificial deal with mills, and hard-coded seed phrases, in addition to block people who write on the chain throughout pockets import or creation.
“This system lets risk actors swap chains and RPC endpoints with little effort, so detections that depend on domains, URLs, or particular extension IDs will miss it,” Boychenko stated. “Deal with sudden blockchain RPC calls from the browser as excessive sign, particularly when the product claims to be single chain.”

The Hacker News Tags:Blockchain, Chrome, Ethereum, Extension, Fake, Phrases, Safery, Seed, Steals, Sui, Wallet

Post navigation

Previous Post: Multiple Kibana Vulnerabilities Enables SSRF and XSS Attacks
Next Post: Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data

Related Posts

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The Hacker News
Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup The Hacker News
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News