Scan to Download Gate App
qrCode
More Download Options
Don't remind me again today

Chrome Web Store’s No. 4 crypto wallet can steal user seed phrases

Blockchain security platform Socket has warned of a new malicious crypto wallet extension on Google’s Chrome Web Store that has a unique way of stealing seed phrases to drain user assets

The extension is called “Safery: Ethereum Wallet”and claims itself as a “reliable and secure browser extension designed for easy and efficient management” of Ethereum-based assets

However, as highlighted in a Tuesday report from Socket, the extension is actually designed to steal seed phrases via a crafty backdoor

“Marketed as a simple, secure Ethereum (ETH) wallet, it contains a backdoor that exfiltrates seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a threat actor-controlled Sui wallet,” the report reads

Safety Wallet promo images. Source: Chrome Store
Notably, it currently sits as the fourth search result for “Ethereum Wallet” on the Google Chrome store, just a couple of places behind legitimate wallets like MetaMask, Wombat and Enkrypt

Chrome store search results. Source: Chrome Store The extension enables users to create new wallets or import existing ones from elsewhere, thereby establishing two potential security risks for the user.

In the first scenario, the user creates a new wallet in the extension and immediately sends their seed phrase to the bad actor via a tiny Sui-based transaction. As the wallet is compromised from day one, the funds can be stolen at any time

In the second scenario, the user imports an existing wallet and enters their seed phrase, handing it over to the scammers behind the extension, who can again view the information via the small transaction

“When a user creates or imports a wallet, Safery: Ethereum Wallet encodes the BIP-39 mnemonic into synthetic Sui style addresses, then sends 0.000001 SUI to those recipients using a hardcoded threat actor’s mnemonic,” Socket explained, adding:

“By decoding the recipients, the threat actor reconstructs the original seed phrase and can drain affected assets. The mnemonic leaves the browser concealed inside normal-looking blockchain transactions.”

How crypto users can avoid scam extensions

While this malicious extension appears high in the search results, there are some clear signs that it lacks legitimacy

Related: Scammers posed as Australian police to steal crypto, authorities warn

The extension has zero reviews, very limited branding, grammatical mistakes in some of the branding, no official website, and links to a developer using a Gmail account.

It is important for people to do significant research before they deal with any blockchain platform and tool, be extremely careful with seed phrases, have solid cybersecurity practices, and research well-established alternatives with verified legitimacy

Given that this extension also sends microtransactions, it is essential to consistently monitor and identify wallet transactions, as even small transactions could be harmful

Magazine: ‘Help! My robot vac is stealing my Bitcoin’: When smart devices attack

  • #Blockchain
  • #Hot wallet
  • #Scams
  • #Hacks
  • #Scams & Cybercrime Add reaction
ETH-8.34%
SUI-12.43%
BTC-6.67%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)