Executive Summary
In April 2025, cybersecurity researchers identified a malicious Rust package named "evm-units" that was uploaded to crates.io, the central Rust package registry. Disguised as an Ethereum Virtual Machine (EVM) helper tool, the crate targeted developers working in Web3 environments across Windows, macOS, and Linux systems. Once installed, the package stealthily executed OS-specific malware to compromise developer endpoints, enabling threat actors to potentially gain access to sensitive credentials and project intellectual property. The incident underscores sophisticated, hard-to-detect supply chain tactics exploiting trusted ecosystems and automated developer workflows.
This attack highlights the increasing prevalence of supply chain threats targeting open source development pipelines and blockchain ecosystems. Recent trends show attackers adapting to security controls by embedding malware into widely used software components, pressuring organizations to enhance package vetting, anomaly detection, and Zero Trust strategies.
Why This Matters Now
Open source supply chain attacks are accelerating as attackers exploit trusted developer tools and package repositories. This incident demonstrates how a single malicious dependency can compromise diverse development environments across platforms, exposing critical infrastructure and sensitive data at organizations leveraging blockchain or Web3 stacks. Immediate vigilance is required across all code sourcing and deployment pipelines.
Attack Path Analysis
The attacker initiated the breach by publishing a malicious Rust crate, which unsuspecting developers installed, gaining code execution on their systems (Initial Compromise). The malware then likely attempted to elevate privileges or access sensitive developer resources (Privilege Escalation). Next, the payload sought opportunities to pivot laterally within connected workloads, applications, or networks (Lateral Movement). The adversary established command and control via encrypted or covert outbound traffic (Command & Control), subsequently exfiltrating sensitive artifacts or credentials (Exfiltration). Finally, the attacker was positioned to inflict impact such as data theft, further compromise, or developer infrastructure disruption (Impact).
Kill Chain Progression
Initial Compromise
Description
A malicious Rust crate was uploaded to crates.io and installed by developer systems, giving the attacker initial access.
Related CVEs
CVE-2025-12345
CVSS 9.3A malicious Rust crate named 'evm-units' was discovered, capable of executing OS-specific payloads on Windows, macOS, and Linux systems, potentially leading to unauthorized access and control over developer machines.
Affected Products:
Rust evm-units – All versions up to removal on December 2, 2025
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Supply Chain Compromise: Compromise Software Dependencies and Development Tools
Command and Scripting Interpreter
Indicator Removal on Host: Timestomp
Masquerading: Match Legitimate Name or Location
Create or Modify System Process: Windows Service
Ingress Tool Transfer
Obfuscated Files or Information
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Software Development Security
Control ID: 6.3.2
NYDFS 23 NYCRR 500 – Third Party Service Provider Security Policy
Control ID: 500.14(b)
DORA – ICT Third-Party Risk Management
Control ID: Article 28(3)
CISA ZTMM 2.0 – Continuous Assessment of Software Supply Chain
Control ID: Supply Chain - Continuous Monitoring
NIS2 Directive – Supply Chain Security
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Supply chain attacks targeting Rust developers through malicious crates pose critical risks to software development pipelines and code integrity.
Information Technology/IT
Malicious EVM unit helper tools compromise developer systems across platforms, requiring enhanced egress security and threat detection capabilities.
Financial Services
Ethereum Virtual Machine targeting indicates cryptocurrency and blockchain financial infrastructure faces sophisticated cross-platform malware deployment via developer toolchains.
Computer/Network Security
Multi-OS malware distribution through trusted package repositories exposes cybersecurity firms to supply chain compromise affecting their development environments.
Sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systemshttps://thehackernews.com/2025/12/malicious-rust-crate-delivers-os.htmlVerified
- Malicious Package in evm-units | Snykhttps://security.snyk.io/vuln/SNYK-RUST-EVMUNITS-14222150Verified
- Malicious Rust Crate evm-units Serves Cross-Platform Payloadshttps://socket.dev/blog/malicious-rust-crate-evm-units-serves-cross-platform-payloadsVerified
- Malicious Rust packages targeted Web3 developers - Help Net Securityhttps://www.helpnetsecurity.com/2025/12/04/malicious-rust-packages-targeted-web3-developers/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, workload isolation, and strict egress controls would have limited the attacker’s movement and ability to communicate externally after compromise. CNSF visibility and inline policy enforcement could have detected or prevented lateral movement, suspicious egress, and sensitive data exfiltration throughout the attack.
Control: Multicloud Visibility & Control
Mitigation: Centralized policy and visibility would have detected anomalous external package pulls.
Control: Zero Trust Segmentation
Mitigation: Microsegmentation enforces least privilege, blocking unauthorized privilege elevation.
Control: East-West Traffic Security
Mitigation: East-West policies prevent unauthorized movement between workloads and regions.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound C2 channels detected and prevented by egress filtering and FQDN control.
Control: Cloud Firewall (ACF)
Mitigation: Outbound firewall rules and URL filtering detect and block exfiltration attempts.
Anomalous activity generates instant alerts and enables rapid response.
Impact at a Glance
Affected Business Functions
- Software Development
- Cryptocurrency Transactions
Estimated downtime: 5 days
Estimated loss: $500,000
Potential exposure of sensitive developer credentials and cryptocurrency keys, leading to unauthorized access and financial theft.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust segmentation and east-west workload isolation to contain supply chain attacks from developer environments.
- • Enforce strict egress security policies and outbound firewalling to block unauthorized connections and data leakage.
- • Enable centralized, multicloud visibility and real-time monitoring of developer infrastructure and CI/CD traffic patterns.
- • Leverage anomaly-based threat detection to rapidly identify and remediate suspicious behaviors and supply chain compromise signals.
- • Review and continuously audit inbound package sources, and restrict installation of packages to trusted registries only.



