cryptonews
2025-11-27 18:26:37

Warning: New Chrome Extension Drains Solana Traders – 0.05% Stolen Per Swap

A newly discovered malicious Chrome extension is stealing funds from Solana traders by quietly siphoning a fee from every swap they execute, according to new findings from Socket’s Threat Research Team. The extension, called Crypto Copilot, has been available on the Chrome Web Store since June 2024 and markets itself as a shortcut for executing Solana trades directly from users’ X feeds. Behind the interface, however, researchers found code designed to insert an additional transfer into each Raydium swap, diverting at least 0.0013 SOL, or 0.05% of each transaction, to an attacker-controlled wallet. Source: Socket Crypto Copilot Sends Wallet Data to Suspicious Backend While Draining Trader Funds Socket researchers say the extension constructs a normal Raydium swap instruction but then appends a second instruction that transfers SOL to the wallet address Bjeida. Users only see the legitimate swap in the interface, and most wallet confirmation windows display only a high-level summary of the transaction rather than the full list of instructions. As a result, traders approve what appears to be a standard transaction, unaware of the hidden transfer embedded inside it. The fee logic is fully hardcoded inside the extension and buried under layers of obfuscated JavaScript. Socket notes that the extension applies whichever is greater between the minimum fee and the percentage-based fee, meaning trades above 2.6 SOL incur the full 0.05% extraction. Researchers found that the extension uses variable renaming and aggressive minification to conceal the behavior, and the attacker’s wallet is labeled under an innocuous variable deep inside the bundle. The extension remains online at the time of reporting. Socket says it has submitted a takedown request to Google, but has not received confirmation that action has been taken. Beyond the fee theft, investigators also discovered that Crypto Copilot connects to a backend hosted on crypto-coplilot-dashboard.vercel.app, a misspelled domain that shows only a blank placeholder page. Source: Socket Despite the empty site, the extension regularly sends connected wallet identifiers and activity data to this backend, along with using a hardcoded Helius API key for transaction simulation and RPC calls. A separate domain tied to the tool, cryptocopilot.app, is currently parked. Researchers say the absence of documentation, a functioning dashboard, or any supporting infrastructure is inconsistent with a legitimate trading product and instead reflects common practices seen in malicious browser extensions. While on-chain activity linked to the attacker’s wallet remains limited, investigators believe the low transaction volume likely reflects the extension’s relatively small distribution rather than an absence of risk. They warn that the mechanism scales with trading activity, meaning high-volume users could lose larger amounts over time without noticing the incremental drain. Crypto Losses Fall to 2025 Lows, but Browser Extension Attacks Continue to Climb The discovery comes during a period of heightened scrutiny around browser-based crypto threats. In July, more than 40 malicious Firefox extensions were found impersonating major wallet providers, including MetaMask, Coinbase, Phantom, OKX, and Trust Wallet. Koi Security exposes 40+ malicious crypto wallet extensions in Firefox store targeting seed phrases from @coinbase , @MetaMask , and @TrustWallet as crypto losses explode to $2.2B in 2025. #CryptoWallet #Hack https://t.co/0EcvDev8SY — Cryptonews.com (@cryptonews) July 3, 2025 Those extensions harvested wallet credentials directly from users’ browsers and transmitted them to attacker-controlled servers. Exchanges such as OKX publicly warned users and filed complaints after discovering fake plugins masquerading as official wallet tools. Browser extensions have emerged as one of the most persistent attack vectors in 2025, contributing to a growing share of crypto losses. Wallet-related breaches accounted for $1.7 billion of the $2.2 billion stolen across the first half of the year, according to CertiK. Phishing incidents added another $410 million. Despite the rise in extension-based threats, the broader crypto sector briefly experienced a decline in successful hacks. PeckShield recorded just $18.18 million stolen across 15 incidents in October, the lowest monthly total of the year. Crypto exploits plunged 22% in September, but losses still totaled $127M. The largest attacks hit $UXLINK ($44M) and @swissborg ($41.5M), according to data from @PeckShieldAlert . #crypto #DeFi #hacks https://t.co/FsrFl0qJaw — Cryptonews.com (@cryptonews) October 2, 2025 That figure had been far higher a month earlier when losses reached $127.06 million in September , driven by nearly 20 major exploits. But even as overall losses dipped, high-profile breaches continued. The post Warning: New Chrome Extension Drains Solana Traders – 0.05% Stolen Per Swap appeared first on Cryptonews .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.