Malicious Rust Crate evm-units Serves Cross-Platform Payloads for Silent Execution
Blog post from Socket
The Socket Threat Research Team uncovered a malicious Rust package named evm-units, associated with over 7,000 downloads and allegedly created by the author ablerust. This package disguises itself as a legitimate Ethereum utility, but upon execution, it downloads a hidden payload potentially aimed at cryptocurrency theft, particularly targeting Asian markets where the Qihoo360 antivirus is prevalent. The malware operates across Linux, MacOS, and Windows platforms, executing scripts silently without user detection, and cleverly bypasses defenses by using self-signed certificates. It was removed from Crates.io shortly after discovery, but its presence highlights the risk of supply chain compromises within open-source ecosystems. The malware's dependency on another benign-looking package, uniswap-utils, further exemplifies sophisticated concealment tactics. This incident underscores the importance of vigilant monitoring of open-source dependencies and implementing protective measures like Socket's AI Scanner, which detects malicious activities such as unauthorized payload downloads and execution of scripting commands across various operating systems.