Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

0
Medium
Vulnerabilityweb
Published: Thu Nov 13 2025 (11/13/2025, 13:04:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users' seed phrases. The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing Ethereum cryptocurrency with flexible settings." It was uploaded to the Chrome Web Store on

AI-Powered Analysis

AILast updated: 11/14/2025, 23:38:00 UTC

Technical Analysis

The threat involves a malicious Chrome extension called "Safery: Ethereum Wallet," which impersonates a legitimate Ethereum wallet application. Its primary malicious function is to steal users' wallet seed phrases—mnemonic phrases critical for accessing and controlling Ethereum cryptocurrency wallets. Instead of using conventional command-and-control (C2) servers to exfiltrate stolen data, the malware encodes the seed phrases into synthetic Sui blockchain addresses. It then initiates micro-transactions (sending very small amounts of SUI tokens) from a hard-coded attacker-controlled Sui wallet to these encoded addresses. Because these transactions occur on the public Sui blockchain, the attacker can monitor the blockchain for these micro-transactions, decode the recipient addresses back into the original seed phrases, and gain full control over the victims' wallets. This method effectively hides data exfiltration within normal blockchain activity, making detection difficult. The extension was uploaded to the Chrome Web Store on September 29, 2025, and updated as recently as November 12, 2025, remaining available for download at the time of reporting. The malware dynamically switches blockchain RPC endpoints and chains, evading detection methods that rely on fixed URLs, domains, or extension IDs. Security researchers recommend scanning extensions for mnemonic encoders, synthetic address generators, and suspicious blockchain write operations during wallet import or creation. Users should only use trusted wallet extensions and treat unexpected blockchain RPC calls from browsers as high-risk indicators.

Potential Impact

For European organizations and individual users involved in cryptocurrency management, this threat can lead to direct financial losses through theft of Ethereum assets. Since seed phrases provide full access to wallets, compromised users risk losing all stored cryptocurrency. The stealthy exfiltration method complicates detection and response, increasing the window of exposure. Organizations that provide cryptocurrency services, wallets, or manage digital assets may face reputational damage and regulatory scrutiny if their users are affected. The threat also undermines trust in browser-based wallet extensions, potentially impacting adoption of decentralized finance (DeFi) services. Given the extension’s availability on the Chrome Web Store, European users who download and use this extension are at risk. The attack does not require user interaction beyond installation, increasing the likelihood of compromise. Additionally, the use of the Sui blockchain for covert data exfiltration introduces a novel attack vector that may evade traditional security monitoring tools focused on network traffic or domain filtering.

Mitigation Recommendations

European organizations and users should restrict installation of browser extensions to those vetted and trusted, preferably from official wallet providers with strong reputations. Security teams should implement automated scanning of browser extensions for suspicious behaviors such as mnemonic phrase encoding, synthetic blockchain address generation, and unauthorized blockchain write operations during wallet setup. Monitoring for unusual blockchain RPC calls originating from browsers, especially calls that interact with multiple chains or unexpected endpoints, can provide early detection signals. Endpoint security solutions should be updated to detect and block extensions exhibiting these behaviors. User education campaigns should emphasize the risks of installing unverified wallet extensions and encourage use of hardware wallets or well-established software wallets with open-source codebases. Organizations managing cryptocurrency assets should consider multi-factor authentication and transaction monitoring to detect unauthorized transfers. Finally, collaboration with browser vendors to expedite removal of malicious extensions from official stores is critical.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/11/fake-chrome-extension-safery-steals.html","fetched":true,"fetchedAt":"2025-11-14T23:36:26.027Z","wordCount":985}

Threat ID: 6917bcfbed594783724528e1

Added to database: 11/14/2025, 11:36:27 PM

Last enriched: 11/14/2025, 11:38:00 PM

Last updated: 11/16/2025, 6:02:10 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats