Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

EU says TikTok must disable ‘addictive’ features like infinite scroll and fix recommendation engine

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious Rust Crate delivers OS-specific malware to Web3 developer systems
Identity

Malicious Rust Crate delivers OS-specific malware to Web3 developer systems

userBy userDecember 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 3, 2025Ravi LakshmananMalware / Web3 Security

Cybersecurity researchers have discovered a malicious Rust package with malicious functionality that can target Windows, macOS, and Linux systems and covertly run on developers’ machines under the guise of an Ethereum Virtual Machine (EVM) unit helper tool.

The Rust crate named “evm-units” was uploaded to crates.io in mid-April 2025 by a user named “ablerust” and has garnered over 7,000 downloads in the past eight months. Another package “uniswap-utils” created by the same author has “evm-units” listed as a dependency. Downloaded over 7,400 times. The package was then removed from the package repository.

cyber security

“Based on the victim’s operating system and whether Qihoo 360 antivirus software is running, the package downloads the payload, writes it to the system’s temporary directory, and executes it silently,” Socket security researcher Olivia Brown said in the report. “The package appears to be returning the Ethereum version number, so victims are none the wiser.”

What is notable about this package is that it is explicitly designed to check for the presence of the “qhsafetray.exe” process, an executable associated with 360 Total Security, an antivirus software developed by Chinese security vendor Qihoo 360.

Specifically, the package is designed to call a seemingly innocuous function called “get_evm_version(),” which decodes and accesses an external URL (“download.videotalks”).[.]xyz”) to fetch the next stage payload depending on the operating system you are running –

On Linux, download the script, save it to /tmp/init, and run it in the background using the nohup command. This allows the attacker to gain complete control. On macOS, download a file called init and run it in the background using osascript using the nohup command. On Windows, it downloads the payload and saves it as a PowerShell script file (‘init.ps1’) in a temporary directory to check for running processes. “qhsafetray.exe” before calling the script

If the process does not exist, a Visual Basic Script wrapper is created that runs a hidden PowerShell script with no visible window. If an antivirus process is detected, its execution flow is slightly modified by directly calling PowerShell.

cyber security

“This focus on Qihoo 360 is an unusual and explicitly China-focused targeting metric, as Qihoo 360 is a major internet company in China,” Brown said. “This fits the profile of crypto theft as Asia is one of the largest global markets for crypto retail activity.”

The references to EVM and Uniswap, a decentralized cryptocurrency exchange protocol built on the Ethereum blockchain, indicate that this supply chain incident is designed to target developers in the Web3 space by disguising the packages as Ethereum-related utilities.

“The attacker who executed the malicious code, Ablerust, embedded a cross-platform second-stage loader within a seemingly innocuous function,” Brown said. “To make matters worse, the dependency was pulled into another widely used package (uniswap-utils), allowing the malicious code to be automatically executed during initialization.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe biggest news from AWS’s big technology show re:Invent 2025
Next Article Picklescan bug could allow malicious PyTorch models to bypass scanning and execute code
user
  • Website

Related Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

EU says TikTok must disable ‘addictive’ features like infinite scroll and fix recommendation engine

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

How AI is helping solve labor issues in rare disease treatment

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.