Stop overpaying - start transferring money with Ogvio. Sign up, invite friends & grab Rewards now! 🎁
Top Chrome Wallet Add-On Caught Stealing Recovery Phrases
Key Takeaways
- A Chrome extension named “Safery: Ethereum Wallet” secretly collects users’ recovery phrases under the guise of a secure crypto wallet;
- Security firm Socket found the extension sends stolen seed phrases via disguised microtransactions on the Sui blockchain;
- Both new wallet creation and importing an existing wallet trigger hidden data leaks to an attacker-controlled wallet.
A new browser extension listed on the Chrome Web Store has been caught secretly collecting users’ wallet recovery phrases.
The extension, named Safery: Ethereum Wallet, describes itself as a secure, easy-to-use tool for managing Ethereum
However, a recent investigation by Socket, a blockchain security firm, reveals that it has been developed to steal sensitive wallet information through a hidden method.
Did you know?
Subscribe - We publish new crypto explainer videos every week!
What is Terra Luna? History & Crash Explained (ANIMATED)
According to Socket’s report, the extension includes a backdoor that collects recovery phrases by encoding them in a specific format and sending them out through the Sui
Safery allows people to either set up a new wallet or import an existing one. In both cases, the extension requests the user’s seed phrase. Once entered, this information is immediately processed and sent out in a way that is difficult to detect.
When someone creates a new wallet, the recovery phrase is automatically shared with the attacker through a tiny SUI transaction. If a user brings in an existing wallet, the same process occurs, the phrase is taken and transmitted without any clear sign to the user.
Socket explains in the blog post:
When a user creates or imports a wallet, Safery: Ethereum Wallet encodes the BIP-39 mnemonic into synthetic Sui style addresses, then sends 0.000001 SUI to those recipients using a hardcoded threat actor’s mnemonic.
Recently, Google's Threat Intelligence Group (GTIG) found that North Korean hackers are using artificial intelligence (AI) to support cryptocurrency theft. How? Read the full story.