Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

Posted on December 5, 2025December 5, 2025 By CWS

A harmful new wave of phishing assaults is concentrating on Solana customers by altering pockets possession permissions quite than stealing non-public keys.

A sufferer misplaced greater than USD 3 million in a single assault, with a further USD 2 million locked in funding platforms.

What makes this assault distinctive is that the consumer’s funds remained seen however turned unimaginable to maneuver or management.

The assault works in two shocking methods. First, when customers approve a transaction, wallets present the pockets steadiness to assist customers really feel secure.

Attackers craft particular transactions that seem innocent as a result of they trigger no seen steadiness modifications.

Second, not like different blockchains like Ethereum the place possession is locked to your non-public key, Solana permits pockets house owners to be reassigned by a technical operation.

This distinction leaves many customers unprepared for such assaults. SlowMist safety analysts recognized and studied this rising risk after a consumer reached out for assist.

🚨Watch out for Solana #Phishing Assaults: Pockets Proprietor Permissions Can Be Altered1️⃣Just lately, we assisted a sufferer of a phishing assault that resulted within the unauthorized switch of his account’s Proprietor permission. That is just like the “malicious multisig” –fashion assault generally… pic.twitter.com/7yO1uAJT5a— SlowMist (@SlowMist_Team) December 4, 2025

Upon on-chain investigation, the researchers found that the attacker had already transferred the account Proprietor permission to a special pockets tackle.

Sufferer tried to provoke a switch from the compromised account to their very own tackle to confirm management (Supply – Medium)

This meant the sufferer couldn’t transfer funds, take away approvals, or use their belongings in decentralized finance platforms, regardless of nonetheless proudly owning them.

Understanding the Technical Mechanism Behind Account Possession Modifications

The core of this assault facilities on Solana’s account mannequin. Whenever you create a pockets, its Proprietor is usually the system program, which acts as a default safety authority.

Solana programs use this Proprietor area to confirm that transaction requests come from legit signers.

SlowMist safety researchers famous by technical evaluation that the attackers exploited the “assign” instruction, a built-in Solana command that may change an account’s Proprietor area.

The instruction takes a easy type: it specifies which account to reassign and identifies the brand new proprietor.

When victims unknowingly approve transactions containing this instruction, they basically signal away management of their wallets.

The reassignment occurs quietly with out inflicting any token steadiness modifications, making detection extraordinarily tough for common customers.

What makes detection tougher is that Solana’s structure permits program-derived accounts to have their possession modified if the accounts include no information.

Nevertheless, common consumer wallets observe totally different guidelines. Normal accounts can have their Proprietor reassigned by program invocations, that means attackers can abuse this function if customers approve the precise signature request.

To guard your self, all the time confirm the transaction supply earlier than clicking hyperlinks or approving signatures. By no means grant permission from unfamiliar web sites or messages claiming to be official bulletins.

Think about sustaining separate wallets: one for each day actions with restricted funds and one other chilly storage pockets for beneficial belongings.

When doubtful about any signature request, reject it instantly. Your warning is your strongest protection in opposition to these evolving threats.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attacks, Beware, Hackers, Initiate, Phishing, Solana, Transfer, Unauthorized

Post navigation

Previous Post: Chinese Hackers Exploiting React2Shell Vulnerability
Next Post: CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

Related Posts

CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
10 Best Data Loss Prevention Software in 2025 Cyber Security News
OpenAI Launches $4 ChatGPT Go Plan with Unlimited Access to GPT-5 Cyber Security News
IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark