Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Rust Crate Spreads Malware To Web3 Devs

December 3, 2025
Reading Time: 3 mins read
in Alerts
Rust Crate Spreads Malware To Web3 Devs

A newly discovered malicious Rust package, “evm-units,” uploaded by the user “ablerust” to crates.io in mid-April 2025, successfully attracted over 7,000 downloads before its removal. This insidious package, which presented itself as an Ethereum Virtual Machine unit utility, was actually designed to stealthily compromise developer machines across Windows, macOS, and Linux operating systems. A second package by the same author, “uniswap-utils,” also listed “evm-units” as a dependency and garnered over 7,400 downloads, further spreading the malicious code. The immediate removal of these packages from the repository was necessary to prevent further compromise.

The core malicious functionality resides within a seemingly innocuous function, get_evm_version(). When executed, this function secretly decodes and reaches out to an external URL, download.videotalks[.]xyz, to download a next-stage payload tailored to the victim’s operating system. Socket security researcher Olivia Brown highlighted that the package appears to return a valid Ethereum version number, effectively keeping the victim unaware of the compromise. Depending on the environment, the payload is written to a system temporary directory and silently executed, giving the attacker full control.

A distinctive feature of this cross-platform malware is its explicit check for the presence of the Qihoo 360 antivirus process, qhsafetray.exe, a popular security product in the Chinese market. On Windows, the package downloads a PowerShell script (init.ps1). If the Qihoo 360 process is not detected, it uses a Visual Basic Script wrapper to run the PowerShell script with no visible window. If the antivirus is detected, the execution flow is slightly altered to directly invoke PowerShell. This specific focus on a leading Chinese internet company suggests a rare, explicit, China-focused targeting indicator, which aligns with the prevalent crypto-theft activities often seen in Asia, one of the largest global markets for retail cryptocurrency.

The attack targets were carefully chosen, evidenced by the packages’ names: EVM (Ethereum Virtual Machine) and Uniswap (a decentralized cryptocurrency exchange protocol). These references were designed to appeal directly to and deceive developers working in the Web3 space, who would be looking for Ethereum-related utility tools. The threat actor, “ablerust,” cleverly embedded a cross-platform second-stage loader inside the harmless-looking function, making it difficult to detect upon initial use.

Furthermore, the threat was compounded by the fact that the malicious code was pulled into the “uniswap-utils” package as a dependency, meaning the malicious code could execute automatically during initialization of any project using “uniswap-utils.” This supply chain incident underscores the severe risk of relying on unvetted third-party dependencies, particularly in the fast-moving cryptocurrency and decentralized application development community.

Reference:

  • Rust Crate Distributes Targeted Malware To Web3 Developer Machines
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Illuminate Must Delete Student Data

Lazarus APT Remote Worker Scheme Caught

December 3, 2025
Rust Crate Spreads Malware To Web3 Devs

Google Fixes 107 Android Flaws In Use

December 3, 2025
Rust Crate Spreads Malware To Web3 Devs

Npm Package Evades AI Security Tools

December 3, 2025
Glassworm Malware Strikes Again In VS Code

Shadypanda Extensions Hit Millions Users

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Smarttube Breach Pushes Malicious Update

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Glassworm Malware Strikes Again In VS Code

December 2, 2025

Latest Alerts

Lazarus APT Remote Worker Scheme Caught

Google Fixes 107 Android Flaws In Use

Npm Package Evades AI Security Tools

Rust Crate Spreads Malware To Web3 Devs

Shadypanda Extensions Hit Millions Users

Smarttube Breach Pushes Malicious Update

Subscribe to our newsletter

    Latest Incidents

    Indian Airports Hit By Cyber Attack

    ChatGPT Down Worldwide Users Affected

    Sorbonne Staff Data Found On Dark Web

    French Soccer Federation Suffers Cyberattack

    120,000 Cameras Hacked In South Korea

    Hackers Claim Mercedes Benz USA Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial