Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

Posted on December 5, 2025December 5, 2025 By CWS

A harmful new wave of phishing assaults is concentrating on Solana customers by altering pockets possession permissions quite than stealing non-public keys.

A sufferer misplaced greater than USD 3 million in a single assault, with a further USD 2 million locked in funding platforms.

What makes this assault distinctive is that the consumer’s funds remained seen however turned unimaginable to maneuver or management.

The assault works in two shocking methods. First, when customers approve a transaction, wallets present the pockets steadiness to assist customers really feel secure.

Attackers craft particular transactions that seem innocent as a result of they trigger no seen steadiness modifications.

Second, not like different blockchains like Ethereum the place possession is locked to your non-public key, Solana permits pockets house owners to be reassigned by a technical operation.

This distinction leaves many customers unprepared for such assaults. SlowMist safety analysts recognized and studied this rising risk after a consumer reached out for assist.

🚨Watch out for Solana #Phishing Assaults: Pockets Proprietor Permissions Can Be Altered1️⃣Just lately, we assisted a sufferer of a phishing assault that resulted within the unauthorized switch of his account’s Proprietor permission. That is just like the “malicious multisig” –fashion assault generally… pic.twitter.com/7yO1uAJT5a— SlowMist (@SlowMist_Team) December 4, 2025

Upon on-chain investigation, the researchers found that the attacker had already transferred the account Proprietor permission to a special pockets tackle.

Sufferer tried to provoke a switch from the compromised account to their very own tackle to confirm management (Supply – Medium)

This meant the sufferer couldn’t transfer funds, take away approvals, or use their belongings in decentralized finance platforms, regardless of nonetheless proudly owning them.

Understanding the Technical Mechanism Behind Account Possession Modifications

The core of this assault facilities on Solana’s account mannequin. Whenever you create a pockets, its Proprietor is usually the system program, which acts as a default safety authority.

Solana programs use this Proprietor area to confirm that transaction requests come from legit signers.

SlowMist safety researchers famous by technical evaluation that the attackers exploited the “assign” instruction, a built-in Solana command that may change an account’s Proprietor area.

The instruction takes a easy type: it specifies which account to reassign and identifies the brand new proprietor.

When victims unknowingly approve transactions containing this instruction, they basically signal away management of their wallets.

The reassignment occurs quietly with out inflicting any token steadiness modifications, making detection extraordinarily tough for common customers.

What makes detection tougher is that Solana’s structure permits program-derived accounts to have their possession modified if the accounts include no information.

Nevertheless, common consumer wallets observe totally different guidelines. Normal accounts can have their Proprietor reassigned by program invocations, that means attackers can abuse this function if customers approve the precise signature request.

To guard your self, all the time confirm the transaction supply earlier than clicking hyperlinks or approving signatures. By no means grant permission from unfamiliar web sites or messages claiming to be official bulletins.

Think about sustaining separate wallets: one for each day actions with restricted funds and one other chilly storage pockets for beneficial belongings.

When doubtful about any signature request, reject it instantly. Your warning is your strongest protection in opposition to these evolving threats.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attacks, Beware, Hackers, Initiate, Phishing, Solana, Transfer, Unauthorized

Post navigation

Previous Post: Chinese Hackers Exploiting React2Shell Vulnerability
Next Post: CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

Related Posts

Hackers Exploit AWS IAM Eventual Consistency for Persistence Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Cyber Security News
Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts Cyber Security News
A New LLM Defense Framework to Counter Jailbreak Attacks Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix
  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix
  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark