🔥 BitDegree partnered with Ogvio - a free international money transfer service! Join the waitlist & grab Rewards! 🎁

Top Chrome Wallet Add-On Caught Stealing Recovery Phrases

Key Takeaways

  • ​A Chrome extension named “Safery: Ethereum Wallet” secretly collects users’ recovery phrases under the guise of a secure crypto wallet;
  • Security firm Socket found the extension sends stolen seed phrases via disguised microtransactions on the Sui blockchain;
  • Both new wallet creation and importing an existing wallet trigger hidden data leaks to an attacker-controlled wallet.

Stop overpaying - start transferring money with Ogvio. Join the waitlist & grab early Rewards NOW! 🎁

Top Chrome Wallet Add-On Caught Stealing Recovery Phrases

A new browser extension listed on the Chrome Web Store has been caught secretly collecting users’ wallet recovery phrases.

The extension, named Safery: Ethereum Wallet, describes itself as a secure, easy-to-use tool for managing Ethereum ETH $3,173.30 -based assets.

However, a recent investigation by Socket, a blockchain security firm, reveals that it has been developed to steal sensitive wallet information through a hidden method.

Crypto Token VS Coin (Animated Explainer & Examples)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

According to Socket’s report, the extension includes a backdoor that collects recovery phrases by encoding them in a specific format and sending them out through the Sui SUI $1.80 blockchain.

Safery allows people to either set up a new wallet or import an existing one. In both cases, the extension requests the user’s seed phrase. Once entered, this information is immediately processed and sent out in a way that is difficult to detect.

When someone creates a new wallet, the recovery phrase is automatically shared with the attacker through a tiny SUI transaction. If a user brings in an existing wallet, the same process occurs, the phrase is taken and transmitted without any clear sign to the user.

Socket explains in the blog post:

When a user creates or imports a wallet, Safery: Ethereum Wallet encodes the BIP-39 mnemonic into synthetic Sui style addresses, then sends 0.000001 SUI to those recipients using a hardcoded threat actor’s mnemonic.

Recently, Google's Threat Intelligence Group (GTIG) found that North Korean hackers are using artificial intelligence (AI) to support cryptocurrency theft. How? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

GET EARLY REWARDS

Join Ogvio Waitlist
Rating
5.0