Exposed: SeaFlower Backdoor Campaign Steals Web3 Wallet Seed Phrases
Imagine downloading what looks like your favorite Web3 wallet app, setting it up with your precious seed phrase, and thinking everything is secure. Then, in the background, hackers quietly steal your crypto keys. This is no movie plot—it’s the real danger of the
This sneaky attack has been targeting users since early 2022. It shows how Web3 wallets face big risks in the fast-growing crypto world. Attackers use smart tricks to grab seed phrases without you noticing. In this post, we break it down simply: what it is, how it works, and how to stay safe.
What is the SeaFlower Backdoor Campaign?
SeaFlower is a cyber threat named after clues in Chinese language found by researchers. It focuses on popular Web3 wallets. The goal? Steal seed phrases—the 12 or 24 words that control your crypto funds.
Unlike simple scams, SeaFlower embeds backdoor code into real apps. This code looks harmless but sends your data to hackers. It’s one of the most advanced attacks on Web3 wallets, rivaling groups like Lazarus.
Clues like macOS usernames, Chinese IP addresses, and signing tools point to a Chinese-speaking team. But pinning it exactly is hard in cyber crime.
How Does the SeaFlower Backdoor Work?
The attack is super stealthy. Here’s the step-by-step:
- App Modification: Hackers take legit apps like MetaMask, Coinbase Wallet, TokenPocket, or imToken. They add hidden backdoor code.
- Normal Look: The app works fine. UI, transactions—all normal. No red flags.
- Seed Phrase Trap: When you enter or store your seed phrase, the backdoor activates. It uses functions like
startupload()to send data over encrypted connections to hacker servers. - Hidden Tools: They tweak libraries like MonkeyDev to grab data from app storage without alerts.
Network checks show talks to odd domains. But average users miss this. Reverse-engineering shows custom code running quietly.
Which Web3 Wallets Are Targeted?
SeaFlower hits big names:
- MetaMask (iOS version has clear backdoor)
- Coinbase Wallet
- TokenPocket
- imToken
These are trusted by millions. One wrong download, and your funds are at risk.
How Do Attackers Spread These Fake Apps?
No phishing emails here. They clone official download sites perfectly.
Promotion happens on Chinese search engines like Baidu. Users search for wallets, click bad results, land on fakes, and download poisoned apps.
These sites trick even careful users. Apps may use third-party profiles to bypass checks.
Why Is SeaFlower So Sophisticated?
Most malware crashes apps or shows pop-ups. SeaFlower doesn’t. It stays hidden, only acts on seed phrases. Compared to Lazarus hacks, it’s right up there in tech skill.
Risks are huge: One seed phrase equals full wallet control. Billions in crypto lost yearly to similar threats.
Signs Your Wallet Might Be Compromised
Hard to spot, but watch for:
- Unusual network traffic (use tools like Wireshark)
- Apps from non-official sources
- Slow performance or odd permissions
If you suspect, move funds to a new wallet ASAP.
How to Protect Against SeaFlower and Similar Attacks
Stay safe with these simple steps:
- Official Sources Only: Download from App Store, Google Play, or official sites. Avoid Baidu or third-party links.
- Verify Apps: Check hashes or signatures if possible.
- Hardware Wallets: Use Ledger or Trezor for big holdings—seed stays offline.
- Seed Security: Never enter seed in apps. Use recovery phrases carefully.
- Network Monitors: Tools like Little Snitch (macOS) flag bad connections.
- Updates: Keep apps and OS updated.
- Multi-Sig: For high value, use wallets needing multiple approvals.
Wallet makers should add better checks for backdoors and warn on suspicious traffic.
The Bigger Picture: Web3 Security Challenges
SeaFlower warns of Web3’s weak spots. As crypto booms, hackers evolve. Seed phrases are king in decentralized finance (DeFi), but also the biggest target.
Future fixes? Better app signing, AI anomaly detection, and user education. Regulators may push standards too.
Don’t let
Stay Ahead of Crypto Threats
Web3 is exciting but risky. Follow best practices, and your funds stay safe. Share this post to warn friends. What steps do you take for wallet security? Drop a comment below.