your .env files are being SHIPPED to a lookalike domain and you probably typed the cargo add yourself


socket security just found 5 malicious rust crates sitting on io since february 2026 - chrono_anchor, dnp3times, time_calibrator, time_calibrators, time-sync
they all pretend to be time utilities. they all impersonate io. they all phone home to timeapis[.]io - one letter difference
the entire payload does one thing. reads your .env file. grabs every secret in it. sends it to a domain the attacker controls
not a zero day. not a kernel exploit. just a crate that looks like something youd cargo add at 1am without thinking
> "my dependencies are all popular and vetted"
these crates MIMIC the naming patterns of trusted libraries. chrono_anchor sits right next to chrono in your autocomplete. thats the whole trick.
post-image
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin