Skip to content

Commit b9d770b

Browse files
Merge pull request #1703 from integer32llc/typos
Some typo fixes in walter's post
2 parents 868aa38 + 162a14c commit b9d770b

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

content/crates.io-malicious-crates-fasterlog-and-asyncprintln.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,36 +10,36 @@ team_url = "https://www.rust-lang.org/governance/teams/dev-tools#team-crates-io"
1010

1111
## Summary
1212

13-
On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solona private keys, and arbitrary byte arrays for exflitration.
13+
On September 24th, the crates.io team was notified by Kirill Boychenko from the [Socket Threat Research Team][socket] of two malicious crates which were actively searching file contents for Etherum private keys, Solana private keys, and arbitrary byte arrays for exfiltration.
1414

1515
These crates were:
1616
- `faster_log` - Published on May 25th, 2025, downloaded 7181 times
1717
- `async_println` - Published on May 25th, 2025, downloaded 1243 times
1818

19-
The malicious code was executed at runtime, when running or testing a project depending on them. Notably, they did not execute any malicious code at build time. Except for their malicious payload, these crates copied the source code, features, documentation of legitimate crates, using a similiar name to them (a case of typosquatting[^typosquatting]).
19+
The malicious code was executed at runtime, when running or testing a project depending on them. Notably, they did not execute any malicious code at build time. Except for their malicious payload, these crates copied the source code, features, and documentation of legitimate crates, using a similiar name to them (a case of typosquatting[^typosquatting]).
2020

2121

2222
## Actions taken
2323

24-
The user in question was immediately disabled, and the crates in question were deleted[^deletion] from crates.io shortly after. We have retained copies of all logs associated with the users and the malicious crate files for further analysis.
24+
The users in question were immediately disabled, and the crates in question were deleted[^deletion] from crates.io shortly after. We have retained copies of all logs associated with the users and the malicious crate files for further analysis.
2525

26-
The deletion was performed at 15:34 UTC on September 24, 2025.
26+
The deletion was performed at 15:34 UTC on September 24, 2025.
2727

2828
## Analysis
2929

30-
Both crates were copies of a crate which provided logging functionality, and the logging implementation remained functional in the malicious crates. The original crate had a feature which performed log file packing, which iterated an associated directories files.
30+
Both crates were copies of a crate which provided logging functionality, and the logging implementation remained functional in the malicious crates. The original crate had a feature which performed log file packing, which iterated over an associated directories files.
3131

3232
The attacker inserted code to perform the malicious action during a log packing operation, which searched the log files being processed from that directory for:
3333

3434
- Quoted Ethereum private keys (0x + 64 hex)
3535
- Solana-style Base58 secrets
3636
- Bracketed byte arrays
3737

38-
The crates then proceeded to exflitrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.
38+
The crates then proceeded to exfiltrate the results of this search to `https://mainnet[.]solana-rpc-pool[.]workers[.]dev/`.
3939

40-
These crates had no dependenant downstream crates on crates.io.
40+
These crates had no dependent downstream crates on crates.io.
4141

42-
The malicious users associated with these crates had no other crates or publishes, and the team is actively investigating associative actions in our retained[^retention] logs.
42+
The malicious users associated with these crates had no other crates or publishes, and the team is actively investigating associative actions in our retained[^retention] logs.
4343

4444
## Thanks
4545

0 commit comments

Comments
 (0)