Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Posted on November 26, 2025November 26, 2025 By CWS

Nov 26, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have found a brand new malicious extension on the Chrome Net Retailer that is able to injecting a stealthy Solana switch right into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency pockets.
The extension, named Crypto Copilot, was first revealed by a consumer named “sjclark76” on Might 7, 2024. The developer describes the browser add-on as providing the flexibility to “commerce crypto instantly on X with real-time insights and seamless execution.” The extension has 12 installs and stays out there for obtain as of writing.

“Behind the interface, the extension injects an additional switch into each Solana swap, siphoning a minimal of 0.0013 SOL or 0.05% of the commerce quantity to a hardcoded attacker-controlled pockets,” Socket safety researcher Kush Pandya stated in a Tuesday report.
Particularly, the extension incorporates obfuscated code that involves life when a consumer performs a Raydium swap, manipulating it to inject an undisclosed SOL switch into the identical signed transaction. Raydium is a decentralized alternate (DEX) and automatic market maker (AMM) constructed on the Solana blockchain.

It really works by appending a hidden SystemProgram.switch util methodology to every swap earlier than the consumer’s signature is requested, and sends the payment to a hard-coded pockets embedded within the code. The payment is calculated primarily based on the quantity traded, charging a minimal of 0.0013 SOL for trades and a couple of.6 SOL and 0.05% of the swap quantity if it is greater than 2.6 SOL. To keep away from detection, the malicious conduct is hid utilizing methods like minification and variable renaming.
The extension additionally communicates with a backend hosted on the area “crypto-coplilot-dashboard.vercel[.]app” to register related wallets, fetch factors and referral information, and report consumer exercise. The area, together with “cryptocopilot[.]app,” doesn’t host any actual product.

What’s notable concerning the assault is that customers are fully saved at the hours of darkness concerning the hidden platform payment, and the consumer interface solely exhibits particulars of the swap. Moreover, Crypto Copilot makes use of legit providers like DexScreener and Helius RPC to lend it a veneer of belief.
“As a result of this switch is added silently and despatched to a private pockets slightly than a protocol treasury, most customers won’t ever discover it except they examine every instruction earlier than signing,” Pandya stated. “The encircling infrastructure seems designed solely to cross Chrome Net Retailer evaluate and supply a veneer of legitimacy whereas siphoning charges within the background.”

The Hacker News Tags:Caught, Chrome, Extension, Fees, Hidden, Injecting, Raydium, Solana, Swaps, Transfer

Post navigation

Previous Post: Microsoft Details Security Risks of New Agentic AI Feature
Next Post: Ransomware Attack Disrupts Local Emergency Alert System Across US

Related Posts

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News
New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events The Hacker News
Automating vCISO and Compliance Services The Hacker News
DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure The Hacker News
Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach
  • Hackers Actively Attacking Telecommunications & Media Industry to Deploy Malicious Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach
  • Hackers Actively Attacking Telecommunications & Media Industry to Deploy Malicious Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark