Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users' seed phrases. The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing Ethereum cryptocurrency with flexible settings." It was uploaded to the Chrome Web Store on
AI Analysis
Technical Summary
The threat involves a malicious Chrome extension called "Safery: Ethereum Wallet," which impersonates a legitimate Ethereum wallet application. Its primary malicious function is to steal users' wallet seed phrases—mnemonic phrases critical for accessing and controlling Ethereum cryptocurrency wallets. Instead of using conventional command-and-control (C2) servers to exfiltrate stolen data, the malware encodes the seed phrases into synthetic Sui blockchain addresses. It then initiates micro-transactions (sending very small amounts of SUI tokens) from a hard-coded attacker-controlled Sui wallet to these encoded addresses. Because these transactions occur on the public Sui blockchain, the attacker can monitor the blockchain for these micro-transactions, decode the recipient addresses back into the original seed phrases, and gain full control over the victims' wallets. This method effectively hides data exfiltration within normal blockchain activity, making detection difficult. The extension was uploaded to the Chrome Web Store on September 29, 2025, and updated as recently as November 12, 2025, remaining available for download at the time of reporting. The malware dynamically switches blockchain RPC endpoints and chains, evading detection methods that rely on fixed URLs, domains, or extension IDs. Security researchers recommend scanning extensions for mnemonic encoders, synthetic address generators, and suspicious blockchain write operations during wallet import or creation. Users should only use trusted wallet extensions and treat unexpected blockchain RPC calls from browsers as high-risk indicators.
Potential Impact
For European organizations and individual users involved in cryptocurrency management, this threat can lead to direct financial losses through theft of Ethereum assets. Since seed phrases provide full access to wallets, compromised users risk losing all stored cryptocurrency. The stealthy exfiltration method complicates detection and response, increasing the window of exposure. Organizations that provide cryptocurrency services, wallets, or manage digital assets may face reputational damage and regulatory scrutiny if their users are affected. The threat also undermines trust in browser-based wallet extensions, potentially impacting adoption of decentralized finance (DeFi) services. Given the extension’s availability on the Chrome Web Store, European users who download and use this extension are at risk. The attack does not require user interaction beyond installation, increasing the likelihood of compromise. Additionally, the use of the Sui blockchain for covert data exfiltration introduces a novel attack vector that may evade traditional security monitoring tools focused on network traffic or domain filtering.
Mitigation Recommendations
European organizations and users should restrict installation of browser extensions to those vetted and trusted, preferably from official wallet providers with strong reputations. Security teams should implement automated scanning of browser extensions for suspicious behaviors such as mnemonic phrase encoding, synthetic blockchain address generation, and unauthorized blockchain write operations during wallet setup. Monitoring for unusual blockchain RPC calls originating from browsers, especially calls that interact with multiple chains or unexpected endpoints, can provide early detection signals. Endpoint security solutions should be updated to detect and block extensions exhibiting these behaviors. User education campaigns should emphasize the risks of installing unverified wallet extensions and encourage use of hardware wallets or well-established software wallets with open-source codebases. Organizations managing cryptocurrency assets should consider multi-factor authentication and transaction monitoring to detect unauthorized transfers. Finally, collaboration with browser vendors to expedite removal of malicious extensions from official stores is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Italy, Spain
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
Description
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users' seed phrases. The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing Ethereum cryptocurrency with flexible settings." It was uploaded to the Chrome Web Store on
AI-Powered Analysis
Technical Analysis
The threat involves a malicious Chrome extension called "Safery: Ethereum Wallet," which impersonates a legitimate Ethereum wallet application. Its primary malicious function is to steal users' wallet seed phrases—mnemonic phrases critical for accessing and controlling Ethereum cryptocurrency wallets. Instead of using conventional command-and-control (C2) servers to exfiltrate stolen data, the malware encodes the seed phrases into synthetic Sui blockchain addresses. It then initiates micro-transactions (sending very small amounts of SUI tokens) from a hard-coded attacker-controlled Sui wallet to these encoded addresses. Because these transactions occur on the public Sui blockchain, the attacker can monitor the blockchain for these micro-transactions, decode the recipient addresses back into the original seed phrases, and gain full control over the victims' wallets. This method effectively hides data exfiltration within normal blockchain activity, making detection difficult. The extension was uploaded to the Chrome Web Store on September 29, 2025, and updated as recently as November 12, 2025, remaining available for download at the time of reporting. The malware dynamically switches blockchain RPC endpoints and chains, evading detection methods that rely on fixed URLs, domains, or extension IDs. Security researchers recommend scanning extensions for mnemonic encoders, synthetic address generators, and suspicious blockchain write operations during wallet import or creation. Users should only use trusted wallet extensions and treat unexpected blockchain RPC calls from browsers as high-risk indicators.
Potential Impact
For European organizations and individual users involved in cryptocurrency management, this threat can lead to direct financial losses through theft of Ethereum assets. Since seed phrases provide full access to wallets, compromised users risk losing all stored cryptocurrency. The stealthy exfiltration method complicates detection and response, increasing the window of exposure. Organizations that provide cryptocurrency services, wallets, or manage digital assets may face reputational damage and regulatory scrutiny if their users are affected. The threat also undermines trust in browser-based wallet extensions, potentially impacting adoption of decentralized finance (DeFi) services. Given the extension’s availability on the Chrome Web Store, European users who download and use this extension are at risk. The attack does not require user interaction beyond installation, increasing the likelihood of compromise. Additionally, the use of the Sui blockchain for covert data exfiltration introduces a novel attack vector that may evade traditional security monitoring tools focused on network traffic or domain filtering.
Mitigation Recommendations
European organizations and users should restrict installation of browser extensions to those vetted and trusted, preferably from official wallet providers with strong reputations. Security teams should implement automated scanning of browser extensions for suspicious behaviors such as mnemonic phrase encoding, synthetic blockchain address generation, and unauthorized blockchain write operations during wallet setup. Monitoring for unusual blockchain RPC calls originating from browsers, especially calls that interact with multiple chains or unexpected endpoints, can provide early detection signals. Endpoint security solutions should be updated to detect and block extensions exhibiting these behaviors. User education campaigns should emphasize the risks of installing unverified wallet extensions and encourage use of hardware wallets or well-established software wallets with open-source codebases. Organizations managing cryptocurrency assets should consider multi-factor authentication and transaction monitoring to detect unauthorized transfers. Finally, collaboration with browser vendors to expedite removal of malicious extensions from official stores is critical.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/fake-chrome-extension-safery-steals.html","fetched":true,"fetchedAt":"2025-11-14T23:36:26.027Z","wordCount":985}
Threat ID: 6917bcfbed594783724528e1
Added to database: 11/14/2025, 11:36:27 PM
Last enriched: 11/14/2025, 11:38:00 PM
Last updated: 1/7/2026, 6:12:19 AM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.