
A new wave of cyber deception has entered the Chrome Web Store — this time masquerading as an Ethereum wallet. The extension, titled “Safery: Ethereum Wallet,” is drawing attention from blockchain security specialists for its stealthy method of stealing users’ seed phrases. According to recent findings from blockchain security firm Socket, the malicious software hides behind legitimate branding cues to infiltrate user systems and siphon cryptocurrency holdings undetected.
The “Safery: Ethereum Wallet” Chrome extension promotes itself as a secure and efficient browser add-on for managing Ethereum-based assets. Its description claims it offers an intuitive user experience and an industry-standard security model — assertions that have successfully placed it as the fourth result in Chrome Web Store searches for “Ethereum Wallet”, just behind trusted names like MetaMask, Wombat, and Enkrypt.
Yet, what appears to be a professional tool is in fact a Trojan horse engineered for theft. Socket’s analysis reveals that the extension houses a backdoor capable of exfiltrating sensitive recovery data from users under the guise of network activity. As outlined in their technical report, once a user creates or imports a wallet, the extension discreetly encodes their BIP-39 mnemonic (the seed phrase used to recover crypto wallets) into disguised blockchain activity on the Sui network.
“By encoding seed phrases into Sui addresses and broadcasting microtransactions from a threat actor-controlled Sui wallet, the extension transmits users’ recovery keys directly to scammers,” Socket explained. The clever mechanism conceals the stolen data within what appear to be normal blockchain transactions — a technique designed to bypass user suspicion and conventional security scans.
The malicious extension operates through two primary exploit pathways:
Socket adds that, “By decoding the recipients’ addresses in these Sui transactions, the threat actor can fully reconstruct the user’s original seed phrase and steal the associated assets. The mnemonic leaves the browser disguised as routine blockchain activity.”
This innovative backdoor reflects an alarming evolution in crypto-related phishing and malware attacks — one that underscores the growing sophistication of threat actors targeting the DeFi and Web3 sectors. Similar to recent exploits highlighted in our analysis of Socket Protocol’s $3.3 million cross-chain security breach, this new scheme amplifies industry calls for stronger proactive blockchain security hiring and due diligence by users.
Despite sitting prominently in Chrome’s search results, several warning signs betray the extension’s legitimacy. Observers have noted a complete lack of user reviews, absent or low-quality branding materials, multiple grammatical errors, and a developer credential tied to a public Gmail account — far removed from the professionalism seen in legitimate projects.
Additionally, the extension’s promotional graphics include inconsistent design elements and mismatched copy. These patterns strongly resemble earlier cases of fraudulent Web3 tools used to impersonate trusted dApps and wallets. The absence of an official website or verifiable support channel further reinforces speculation that “Safery” is an elaborate phishing trap targeting newcomers to cryptocurrency.
In an environment where new blockchain investors often rely on convenience and quick downloads, such deceptive marketing tactics have proven effective time and again. As seen in prior phishing waves, detailed in our coverage of £46 million lost to crypto phishing scams in September, even small lapses in verification can have devastating financial consequences.
One especially insidious element of this scheme is its reliance on microtransactions to mask the theft. Because these transactions use inconspicuous amounts of SUI, they are often overlooked. However, each one effectively carries fragments of the user’s recovery phrase. When decoded by the attacker’s software, the complete wallet access data is reconstructed — a method both inexpensive and alarmingly effective.
Experts in blockchain security recruitment note that such tactics demonstrate an increasing need for specialists skilled in on-chain forensics and crypto anomaly detection. “Microtransactions are becoming a signature technique in modern blockchain exploits,” commented a lead blockchain recruiter from Spectrum Search. “The demand for Web3 security engineers who can spot these traces before they escalate is skyrocketing.”
Though the “Safery” case is highly specific, it epitomises the vast ecosystem of fraudulent browser extensions and copycat tools targeting digital-asset enthusiasts. Avoiding such attacks requires a mix of technical awareness and cautious behaviour:
Similar cautionary patterns were observed earlier this year when hackers deployed address-poisoning tactics against unsuspecting traders — an incident we explored in our address-poisoning security report.
As crypto ecosystems expand, the sophistication of attacks like this one calls not only for heightened user vigilance but a broader shift in blockchain recruitment. A qualified Web3 recruitment agency can play a pivotal role in ensuring that DeFi projects and blockchain enterprises onboard the right cybersecurity talent — engineers, auditors and compliance experts capable of identifying code anomalies long before exploits hit the market.
Crypto recruitment trends in 2025 are already demonstrating an escalation in demand for DeFi security professionals and blockchain auditors as firms recognise that trust, not tokenomics, is now the cornerstone of innovation. Each emerging scheme, from browser-based phishing to cross-chain exploits, underscores a core truth: security talent acquisition is as vital to the future of digital economies as product development itself.
In the wake of the “Safery: Ethereum Wallet” exposure, industry watchers predict an upcoming joint initiative between blockchain security platforms and tech recruitment specialists to standardise vetting for browser extensions and Web3 tools — echoing safety campaigns that followed the WazirX exchange breach and Bybit’s $1.4 billion heist.
Though Google is expected to remove the malicious extension soon, its brief appearance demonstrates how thin the line between convenience and compromise remains in the decentralised age — and how critical credible Web3 recruitment and blockchain compliance expertise have become to safeguarding the industry’s reputation.