Amidst the growing threats to cryptocurrency security, a alarming incident has occurred: a fraudulent Ethereum wallet extension infiltrated the Google Chrome Web Store, stealing users’ secret recovery phrases. This malware, named “Safery: Ethereum Wallet,” masqueraded as a legitimate wallet extension, posing a direct threat to the security of users’ crypto assets.
This event underscores the necessity for users participating in Decentralized Finance (DeFi) markets to be vigilant, even on centralized platforms. This attack did not exploit a smart contract flaw; rather, it directly targeted users’ Private Data.
The Malware’s Deceptive Technical Mechanism
Security researchers (Socket) confirmed that the “Safery” extension operated through a sophisticated backdoor mode. Its process is far more subtle than typical Phishing schemes:
Seed Phrase Targeting
When users attempted to create a new wallet using this extension or log in with existing wallet seed phrases, the extension’s malicious code immediately executed and captured those secret recovery phrases. This provided the thief with complete control over the wallet.
Concealing the Theft via Microtransactions
To exfiltrate the stolen seed phrases, the malware used an innovative method: the stolen data was first converted into Sui blockchain addresses. This data was then sent to the external hacker address via very small, nearly invisible microtransactions of around 0.000001 SUI tokens.
These minute transactions served as covert data channels for the attacker. By decoding the recipient addresses, they could reconstruct the victims’ seed phrases. Since these microtransactions appeared like routine wallet activity, the theft was concealed from both users and blockchain monitors, making it difficult to detect immediately.
Social Media Reactions and Security Warnings
Immediately following the news, widespread discussions erupted on social media, particularly on platforms related to crypto security.
Social Media Concerns
Users of legitimate wallets like MetaMask and Trust Wallet raised serious questions about Google’s security practices, questioning how fraudulent extensions managed to occupy a prominent spot in the Chrome Store. Blockchain experts commented, “It reconfirms that if you give up your Private Key, it’s not your money.” This incident highlighted how trust issues on Web2 platforms (Chrome Store) threaten the security of Web3 assets.
Simple Ways to Detect Fraud
Security experts advised users to check for additional warning signs:
- Lack of Reviews: The “Safery: Ethereum Wallet” extension had no user reviews, a critical red flag.
- Branding Quality: Poor logo quality or names with common misspellings are frequent signs of fraud.
- Developer Identity: Users should verify the developer’s identity and their Community Opinion before installing an extension.
Key Lessons for Security
This series of scams offers several critical lessons for cryptocurrency holders regarding security.
- Trusted Providers: Always use the most reliable wallet providers with strong security and a proven history, such as MetaMask, Ledger, or Wombat.
- Transaction Auditing: It is crucial to consistently audit all transactions originating from the wallet, even microtransactions like the small SUI token transfers. This helps detect unusual activity early on.
- Avoid New Extensions: It is best to avoid new or unproven crypto wallet extensions. Extensions should only be downloaded through official websites.
The Digital Asset Security Challenge
The fraud involving the “Safery: Ethereum Wallet” extension underscores the ongoing security challenge for the crypto community. While the blockchain itself may be secure, the end-user interfaces and Browser Platforms used to access it are always vulnerable. Therefore, users’ individual vigilance remains the first and most crucial line of defense for protecting their digital assets.









