Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

Posted on December 5, 2025December 5, 2025 By CWS

A harmful new wave of phishing assaults is concentrating on Solana customers by altering pockets possession permissions quite than stealing non-public keys.

A sufferer misplaced greater than USD 3 million in a single assault, with a further USD 2 million locked in funding platforms.

What makes this assault distinctive is that the consumer’s funds remained seen however turned unimaginable to maneuver or management.

The assault works in two shocking methods. First, when customers approve a transaction, wallets present the pockets steadiness to assist customers really feel secure.

Attackers craft particular transactions that seem innocent as a result of they trigger no seen steadiness modifications.

Second, not like different blockchains like Ethereum the place possession is locked to your non-public key, Solana permits pockets house owners to be reassigned by a technical operation.

This distinction leaves many customers unprepared for such assaults. SlowMist safety analysts recognized and studied this rising risk after a consumer reached out for assist.

🚨Watch out for Solana #Phishing Assaults: Pockets Proprietor Permissions Can Be Altered1️⃣Just lately, we assisted a sufferer of a phishing assault that resulted within the unauthorized switch of his account’s Proprietor permission. That is just like the “malicious multisig” –fashion assault generally… pic.twitter.com/7yO1uAJT5a— SlowMist (@SlowMist_Team) December 4, 2025

Upon on-chain investigation, the researchers found that the attacker had already transferred the account Proprietor permission to a special pockets tackle.

Sufferer tried to provoke a switch from the compromised account to their very own tackle to confirm management (Supply – Medium)

This meant the sufferer couldn’t transfer funds, take away approvals, or use their belongings in decentralized finance platforms, regardless of nonetheless proudly owning them.

Understanding the Technical Mechanism Behind Account Possession Modifications

The core of this assault facilities on Solana’s account mannequin. Whenever you create a pockets, its Proprietor is usually the system program, which acts as a default safety authority.

Solana programs use this Proprietor area to confirm that transaction requests come from legit signers.

SlowMist safety researchers famous by technical evaluation that the attackers exploited the “assign” instruction, a built-in Solana command that may change an account’s Proprietor area.

The instruction takes a easy type: it specifies which account to reassign and identifies the brand new proprietor.

When victims unknowingly approve transactions containing this instruction, they basically signal away management of their wallets.

The reassignment occurs quietly with out inflicting any token steadiness modifications, making detection extraordinarily tough for common customers.

What makes detection tougher is that Solana’s structure permits program-derived accounts to have their possession modified if the accounts include no information.

Nevertheless, common consumer wallets observe totally different guidelines. Normal accounts can have their Proprietor reassigned by program invocations, that means attackers can abuse this function if customers approve the precise signature request.

To guard your self, all the time confirm the transaction supply earlier than clicking hyperlinks or approving signatures. By no means grant permission from unfamiliar web sites or messages claiming to be official bulletins.

Think about sustaining separate wallets: one for each day actions with restricted funds and one other chilly storage pockets for beneficial belongings.

When doubtful about any signature request, reject it instantly. Your warning is your strongest protection in opposition to these evolving threats.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attacks, Beware, Hackers, Initiate, Phishing, Solana, Transfer, Unauthorized

Post navigation

Previous Post: Chinese Hackers Exploiting React2Shell Vulnerability
Next Post: CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems

Related Posts

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Cyber Security News
New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT Cyber Security News
APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials APT36 Hackers Attacking Indian Government Entities to Steal Login Credentials Cyber Security News
London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines Cyber Security News
Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control Cyber Security News
Top 10 Best Deception Tools in 2025 Top 10 Best Deception Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News