Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Posted on November 26, 2025November 26, 2025 By CWS

Nov 26, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have found a brand new malicious extension on the Chrome Net Retailer that is able to injecting a stealthy Solana switch right into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency pockets.
The extension, named Crypto Copilot, was first revealed by a consumer named “sjclark76” on Might 7, 2024. The developer describes the browser add-on as providing the flexibility to “commerce crypto instantly on X with real-time insights and seamless execution.” The extension has 12 installs and stays out there for obtain as of writing.

“Behind the interface, the extension injects an additional switch into each Solana swap, siphoning a minimal of 0.0013 SOL or 0.05% of the commerce quantity to a hardcoded attacker-controlled pockets,” Socket safety researcher Kush Pandya stated in a Tuesday report.
Particularly, the extension incorporates obfuscated code that involves life when a consumer performs a Raydium swap, manipulating it to inject an undisclosed SOL switch into the identical signed transaction. Raydium is a decentralized alternate (DEX) and automatic market maker (AMM) constructed on the Solana blockchain.

It really works by appending a hidden SystemProgram.switch util methodology to every swap earlier than the consumer’s signature is requested, and sends the payment to a hard-coded pockets embedded within the code. The payment is calculated primarily based on the quantity traded, charging a minimal of 0.0013 SOL for trades and a couple of.6 SOL and 0.05% of the swap quantity if it is greater than 2.6 SOL. To keep away from detection, the malicious conduct is hid utilizing methods like minification and variable renaming.
The extension additionally communicates with a backend hosted on the area “crypto-coplilot-dashboard.vercel[.]app” to register related wallets, fetch factors and referral information, and report consumer exercise. The area, together with “cryptocopilot[.]app,” doesn’t host any actual product.

What’s notable concerning the assault is that customers are fully saved at the hours of darkness concerning the hidden platform payment, and the consumer interface solely exhibits particulars of the swap. Moreover, Crypto Copilot makes use of legit providers like DexScreener and Helius RPC to lend it a veneer of belief.
“As a result of this switch is added silently and despatched to a private pockets slightly than a protocol treasury, most customers won’t ever discover it except they examine every instruction earlier than signing,” Pandya stated. “The encircling infrastructure seems designed solely to cross Chrome Net Retailer evaluate and supply a veneer of legitimacy whereas siphoning charges within the background.”

The Hacker News Tags:Caught, Chrome, Extension, Fees, Hidden, Injecting, Raydium, Solana, Swaps, Transfer

Post navigation

Previous Post: Microsoft Details Security Risks of New Agentic AI Feature
Next Post: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

Related Posts

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers The Hacker News
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools The Hacker News
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos The Hacker News
Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark