Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Exflitrate -> exfiltrate
  • Loading branch information
carols10cents committed Sep 24, 2025
commit 93d38618630891700e3bc8868d14f80f3b038ac1
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ team_url = "https://www.rust-lang.org/governance/teams/dev-tools#team-crates-io"

## Summary

On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exflitration.
On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exfiltration.

These crates were:
- `faster_log` - Published on May 25th, 2025, downloaded 7181 times
Expand All @@ -35,7 +35,7 @@ The attacker inserted code to perform the malicious action during a log packing
- Solana-style Base58 secrets
- Bracketed byte arrays

The crates then proceeded to exflitrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.
The crates then proceeded to exfiltrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.

These crates had no dependenant downstream crates on crates.io.

Expand Down