Hello, Rust and crypto enthusiasts. Here’s an alarming tale. Two Rust packages on Crates.io were nefariously searching for crypto wallets keys on the computers of developers. If you had downloaded a Rust crate and hadn’t checked it, you could be the victim.
If you have used either of the crates, you should:
The malicious packages
The two malicious packages were called faster_log and async_println and were released on May 25, 2025. To seem safe, they copied the files and metadata of a legitimate package named fast_log.- faster_log: 7200 downloads
- async_println: 1200 downloads
- Total: about 8500 downloads.
How the assault was executed
The virus targeted:- Ethereum private keys (hexadecimal strings)
- Solana keys/addresses (Base58 strings)
- Other crypto wallet seeds in files
What to do if you were impacted
The encouraging part about this situation is that there were no dependent crates, and the publishers did not release any additional malware.If you have used either of the crates, you should:
- Uninstall any malicious packages from your computer
- Move your cryptocurrencies to new wallets.
- Only use packages from verified publishers
- Validate and verify build instructions to avoid unsafe code.