New Rust Packages Masquerading as fast_log Compromise Solana and Ethereum Wallet Keys

Socket’s Threat Research Team has uncovered two malicious Rust crates, faster_log and async_println, that impersonate the legitimate fast_log logging library.

Published on May 25, 2025, by threat actor aliases RustGuruMan and DumbnBased, these crates collectively amassed 8,424 downloads before being removed.

Crates comparison
Crates comparison: center shows the legitimate fast_log, while left (faster_log) and right (async_println) are malicious. The impostors mimic the name and page design, copy the README, and set the repository to github.com/rbatis/fast_log, which helps them pass casual review and mislead developers.

Under the guise of functional logging, each crate embeds routines that scan local Rust source files for Solana and Ethereum private keys, then exfiltrate any matches via HTTP POST to a hardcoded Cloudflare Workers endpoint at https://mainnet[.]solana-rpc-pool[.]workers[.]dev/.

Malicious Functionality Hidden Behind Logger Cover

Both crates include complete logging implementations copied from the genuine fast_log project to evade cursory inspection. The core malicious logic resides in a Packer struct that recurses through directories, reads .rs files, and applies three regular expressions to extract:

  • Ethereum private keys matching "0x[0-9a-fA-F]{64}"
  • Base58-encoded strings 32–44 characters long, typical of Solana keys
  • Bracketed byte arrays (e.g., [0x12,0xAB,…] or [12,34,…]) that may represent raw key bytes

Each detected item is wrapped in a FoundItem A record containing the key type, exact value, source file path, and line number, then batched into a PackResult The JSON payload was POSTed to the attacker’s C2.

The crates rely solely on standard Rust libraries and the reqwest HTTP client, ensuring cross-platform execution on Linux, macOS, or Windows. No user prompts, local alerts, or build-time hooks are employed; the scanning runs at application or test runtime.

Socket AI Scanner’s analysis
Socket AI Scanner’s analysis of the malicious faster_log package shows covert key exfiltration: a “packer” scans local source files for Ethereum and Solana private keys and POSTs matches to hxxps://mainnet[.]solana-rpc-pool[.]workers[.]dev. The crate typosquats fast_log, reuses its README and repository metadata, and adds macros that trigger the theft.

Within an hour of Socket’s report, the Crate’s security team preserved malicious code for analysis, removed the package listings from crates.io, locked both publisher accounts, and published an advisory detailing their investigation.

No downstream dependents existed for faster_log or async_println, minimizing immediate impact. Legitimate fast_log at nearly 296,000 downloads remains unaffected.

This incident highlights the growing threat to the supply chain posed by typosquatted libraries that reuse project metadata to bypass manual review.

Crates.io search for fast_log
Crates.io search for fast_log showed the legitimate fast_log alongside two imposters, faster_log and async_println. The malicious crates mimic the real project and show download counts: faster_log 7,181 and async_println 1,243, versus legitimate fast_log 295,680 downloads. All three listed an update four months ago, which helped the malicious crates blend in.

Defenders should treat this as a supply chain compromise: remove any lingering dependencies on faster_log or async_println, then rotate all secrets that may appear in source, tests, or fixtures.

Implement file-level secret scanning, enforce network egress controls in developer and CI environments, and write detections for HTTP POST requests containing JSON arrays of key data.

Socket’s ecosystem of defenses, including the Socket GitHub App for PR scanning, the Socket CLI for install-time warnings, and the Socket browser extension for package-page annotations, provides layered protection against future typosquats and covert exfiltration routines.

Integrating these controls alongside robust secret hygiene will help block minimal-code, high-impact supply chain attacks before they compromise critical wallet keys.

Indicators of Compromise (IOCs)

Malicious Crates

Threat Actor’s Crates Aliases

  • dumbnbased
  • rustguruman

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here