Skip to content

Commit 93d3861

Browse files
committed
Exflitrate -> exfiltrate
1 parent d6a1155 commit 93d3861

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/crates.io-malicious-crates-fasterlog-and-asyncprintln.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ team_url = "https://www.rust-lang.org/governance/teams/dev-tools#team-crates-io"
1010

1111
## Summary
1212

13-
On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exflitration.
13+
On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exfiltration.
1414

1515
These crates were:
1616
- `faster_log` - Published on May 25th, 2025, downloaded 7181 times
@@ -35,7 +35,7 @@ The attacker inserted code to perform the malicious action during a log packing
3535
- Solana-style Base58 secrets
3636
- Bracketed byte arrays
3737

38-
The crates then proceeded to exflitrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.
38+
The crates then proceeded to exfiltrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.
3939

4040
These crates had no dependenant downstream crates on crates.io.
4141

0 commit comments

Comments
 (0)