A highly-rated Chrome extension wallet clandestinely transmitted user recovery phrases utilizing Sui micro-transactions, and this activity was not detected until remedial action became impossible.
For a span of several days in November, a rogue Chrome extension was listed as the fourth result when searching for “Ethereum wallet” on the Chrome Web Store.
The extension, designated as “Safery: Ethereum Wallet,” was refined sufficiently to be mistaken for an authentic application. It featured a sleek icon, a generic title coupled with security terms, an abundance of five-star endorsements, and standard descriptions familiar to individuals who have installed a crypto wallet.
Concealed behind that user interface was a specialized assault meticulously crafted to purloin recovery phrases and drain accounts by encoding pilfered confidential data into minute transactions on the Sui decentralized ledger.
The extension was subsequently installed and examined by Socket, a security apparatus firm specializing in open-source software supply chains, following its detection.
Their objective was established to decipher how “Safery” circumvented security measures, ascended the Chrome Store rankings, and relocated purloined recovery phrases without triggering alerts, as well as advising users on detecting comparable risks. The subsequent report elucidates the perpetrator’s methodology and is presented as both a detailed forensic analysis and a caution that browser extensions remain a perilous vulnerability within the digital asset sphere.
This particular incident is significant because the perpetrators did not merely pilfer user recovery phrases. Regrettably, that aspect is considered commonplace within the digital asset domain.
What makes the situation remarkable is that Safery did not imitate an established wallet brand. It was not a MetaMask facsimile or a recycled fraudulent domain. Instead, an identity was fabricated, fake reviews were procured or botted to gain prominence in search rankings, and the application was launched as an entirely “new” wallet selection.
This methodology ensured that the listing displayed no instant indicators of deceit: neither flawed syntax, questionable access privileges, nor redirection to dubious web addresses were immediately visible.
The Chrome Web Store publisher profile was devoid of any preceding grievances, and its designated support URL directed users to an external site that had not been flagged by any security monitoring systems at the time the Socket analysis was conducted.
Considering its sophisticated presentation, most users likely would not have been deterred from selecting “Add to Chrome.” The extension requested permission to operate on “all websites,” a requirement that is frequently sought by digital wallets needing interaction with decentralized applications.
Significantly, it was engineered not to solicit superfluous authorizations or attempt to inject content scripts, which typically would activate Chrome’s more stringent alerts. The corporate branding was kept minimalist, the accompanying website corresponded with the extension’s title, and users were prompted by the setup display to either generate or import a wallet, which constitutes typical operational procedures.
Seed Phrase Theft Exposed Across the Sui Network
The true compromise was initiated immediately after a recovery phrase was supplied. Instead of securing the phrase locally or applying encryption for subsequent user retrieval, the extension covertly segmented it into components and encoded these as what appeared to be arbitrary wallet identifiers.
Socket’s investigation indicates these fragments were incorporated into Sui decentralized ledger transactions. Specifically, the extension initiated minor SUI token disbursements, which were denominated in minuscule sums designed to evade notice, and directed them toward addresses under the control of the perpetrator.
Pieces of the user’s recovery phrase were concealed within those transactions, residing either in specialized memo sections or disguised within complex addresses.
This methodology afforded operational benefits. It did not necessitate the extension transmitting outbound inquiries to hostile servers. Consequently, neither a command-and-control beacon was established nor exfiltration over HTTP or WebSockets was attempted, meaning these methods could not be flagged by a browser or antivirus solution.
The malicious data payload departed the user’s apparatus disguised as a routine blockchain transaction, having been channeled through a commonly utilized, minimal-fee network. Once settled on-chain, the exfiltrated information was rendered publicly available, which permitted the perpetrator to recover it subsequently, reconstitute the recovery phrase, and empty accounts without further interaction with the victim’s device.
In essence, the fraudulent scheme employed the Sui decentralized ledger as its own dedicated communication conduit. Furthermore, due to Sui’s rapid confirmation speeds and minimal transfer expenses, it effectively was utilized as a low-latency messaging architecture.
Socket successfully tracked several instances of these seed-fragment transactions and verified the correlation between the initial recovery phrase input and the subsequent loss of assets. Although the actual thefts took place off-chain, specifically on Ethereum or other Layer 1 networks where victim funds were held, the directives for executing them were concealed openly.
Prior to deploying the iteration that secured a high rank among Chrome’s premier wallet listings, this methodology was likely trialed privately by the publisher. Evidence demonstrates that preceding versions were utilized to explore less complex data exfiltration techniques before the Sui encoding process was perfected.
By the juncture the active extension was officially flagged, it had accumulated sufficient installations to attain Chrome’s “trending” category, thereby significantly amplifying its exposure. Brave New Coin documented that the “Safery” wallet was positioned among the premier results for “Ethereum wallet” inquiries, even while disclosures of questionable conduct were circulated across Reddit and Telegram.
How Chrome’s Ranking Algorithm Allowed This to Happen
The accomplishment of “Safery” was wholly dependent upon Chrome’s proprietary ranking methodology. The Web Store search algorithm assigns weight to keyword correlation, the number of installations, review frequency, average user evaluation, and how recently the application was updated.
Extensions exhibiting a sudden surge in activity, particularly within specialized categories, can ascend the rankings quickly if superior, better-audited rivals are not consistently maintained. In this specific instance, “Safery” possessed a title that was highly ranked for prevalent searches, a torrent of favorable evaluations (many of which were templated or copied), and a recent deployment date.
No documentation suggests that this listing was manually inspected by Google prior to its publication. The Chrome Web Store protocol dictates that the majority of novel extensions are processed via a rapid automated scan and basic static analysis.
Extensions are subjected to more rigorous examination when heightened authorizations are sought, such as gaining entry to tabs, the clipboard, file systems, or browsing history. Wallet extensions frequently circumvent these alerts by functioning within iframes or utilizing sanctioned APIs. “Safery” was maintained within those operational limits.
Even when users voiced concerns, the interval between the initial report and eventual removal was prolonged sufficiently for harm to be inflicted. A portion of this delay is structural: Chrome refrains from acting on flagged extensions immediately unless an overwhelming consensus or recognizable malware signatures are present.
In this specific scenario, the data payload was composed of obscured JavaScript that depended upon decentralized ledger infrastructure, rather than external servers. Consequently, conventional malware identification techniques were unsuccessful in its capture.
This occurrence is not the initial instance where Chrome extensions have been leveraged for the illicit acquisition of digital assets. Prior fraudulent schemes encompassed ersatz Ledger Live applications that solicited user recovery phrases, or authentic extensions that were compromised, granting perpetrators unauthorized access to the developer’s publishing credential.
What distinguishes “Safery” is the seamlessness of its presentation and the complete lack of requisite backend architecture. There was no deceptive website to be dismantled, no controlling server to be obstructed, solely a single extension relocating confidential data onto a public ledger before withdrawing.
Users, nonetheless, retained certain available defensive measures. Should they have mobilized promptly, exposure could be mitigated through the rotation of recovery phrases and the cancellation of transaction mandates.
Triage protocols were supplied by Socket and other entities for individuals who had installed the extension: immediate removal was advised, coupled with the annulment of any token authorizations, transferring assets to a freshly generated wallet utilizing an uncompromised device, and continuous surveillance of connected addresses. For users who failed to observe the covert data exfiltration or who maintained substantial holdings in active wallets, recovery was deemed improbable.
The Problems Start Before the Wallet Even Loads
Enhanced analytical safeguards are being requested from Chrome directly by security specialists and software architects. One suggested remedy involves automatically flagging any extension where User Interface (UI) components are utilized to prompt for a 12- or 24-word recovery sequence.
A distinct strategy is to mandate publisher verification for wallet extensions, a measure which furnishes verifiable affirmation that a specified publisher maintains governance over the source code corresponding to an established wallet identifier. Furthermore, demands are being made for a more rigorous examination of wallet-associated permissions, even when such permissions do not encompass hazardous access methodologies.
A practical guide for extension governance was disseminated by Socket for the benefit of end users. Before any digital asset extension is installed, users are strongly advised to scrutinize the publisher’s antecedent record, authenticate any connection with a recognized project, thoroughly examine the pattern of endorsements (specifically sudden influxes of homogenous reviews), confirm genuine website linkages alongside public GitHub repositories, and evaluate the permissions tab for ambiguous or excessively broad access privileges.
A polished designation and an elevated score are not considered sufficient.
This incident introduces wider inquiries regarding the function of web browsers in the digital asset space. Browser-based wallets became prevalent due to their accessibility and operational simplicity. They enable users to interact with decentralized applications without necessitating platform switching or the download of separate programs, as is often required.
However, that ease of access has been attained at the expense of heightened vulnerability. The web browser constitutes an elevated-risk setting susceptible to extension exploitation, session infiltration, clipboard data retrieval, and, presently, clandestine blockchain data exfiltration.
It is probable that wallet developers will be compelled to reassess their distribution frameworks. Several teams currently advise against Chrome Web Store installations, favoring mobile applications or desktop executables. Other developers may implement alerts for users who are attempting to download from sources lacking official verification.
The fundamental issue is persistent: software deployment is fragmented, and the majority of end users are unaware of how to differentiate an authentic digital wallet from a deceptively refined imitation..
The “Safery” extension had no need to resemble MetaMask or impersonate Phantom. It originated its own identity, cultivated fabricated trust indicators, and established an unseen exploit that was routed through the Sui decentralized ledger as a data transport mechanism.
This occurrence necessitates a re-evaluation of how assurance is confirmed within the crypto user experience (UX), and precisely how foundational even simple applications, such as browser extensions, are positioned near the underlying system architecture.
Digital asset users presume that Web3 signifies autonomy and personal asset control. Yet, when manipulated, a browser wallet is not a secure receptacle; instead, it is rendered an unsecured entry point. Furthermore, Chrome will not invariably notify the user before proprietary data is extracted.


