Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Chrome Addon Injects Hidden Solana Fees

November 26, 2025
Reading Time: 3 mins read
in Alerts
Chrome Addon Injects Hidden Solana Fees

A newly discovered malicious extension on the Chrome Web Store, named Crypto Copilot, has been identified as capable of subtly stealing Solana (SOL) cryptocurrency from unsuspecting users. Published on May 7, 2024, by a user under the name “sjclark76,” the extension purported to offer the ability to “trade crypto directly on X with real-time insights and seamless execution,” despite having only 12 installs when its malicious nature was exposed. It remained available for download at the time of the report.

The core of the attack lies in the extension’s ability to inject an extra transfer into every Solana swap transaction initiated by the user. According to security researchers at Socket, this hidden transfer siphons off a minimum of 0.0013 SOL or 0.05 percent of the total trade amount, directing the stolen funds to a specific, hardcoded attacker-controlled wallet. This mechanism is specifically triggered when a user performs a Raydium swap, Raydium being a popular decentralized exchange (DEX) on the Solana blockchain.

The malicious functionality is implemented through obfuscated code that comes to life during the swap process. Before the user is asked to sign the transaction, the extension quietly appends a hidden SystemProgram.transfer utility method to the transaction. The fee is calculated based on the trade size, with a minimum of 0.0013 SOL for smaller trades and 2.6 SOL plus 0.05 percent of the swap amount for trades exceeding 2.6 SOL. The attackers employed techniques like minification and variable renaming to conceal this behavior and avoid easy detection by security reviews.

Adding to its facade of legitimacy, the Crypto Copilot extension uses external communications with a backend hosted on the domain crypto-coplilot-dashboard.vercel[.]app to register connected wallets and fetch dummy information like points and referral data, as well as to report user activity. Furthermore, the scheme uses entirely legitimate services, such as DexScreener and Helius RPC, which are commonly used in the crypto space, to lend a convincing veneer of trust to the operation, despite the associated domains not hosting any real product.

The most notable aspect of this attack is the complete lack of disclosure to the user regarding the hidden platform fee. Users only see the expected details of their intended swap in the interface, remaining totally unaware of the appended, unauthorized transfer. Researchers emphasized that because the transfer is added silently and routed to a personal wallet rather than a standard protocol treasury, most users would never notice the theft unless they meticulously inspect every instruction within the transaction before signing. The entire surrounding infrastructure appears to have been designed solely to pass the Chrome Web Store review process while consistently siphoning small fees in the background.

Reference:

  • Chrome Extension Adding Hidden Solana Fees To Raydium Swaps For Users Revealed
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Chrome Addon Injects Hidden Solana Fees

JackFix Spreads Stealers Via Fake Updates

November 26, 2025
Chrome Addon Injects Hidden Solana Fees

RomCom Uses Fake Updates To Spread Malware

November 26, 2025
CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

Second Wave Hits Thousands Of Repos

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025
ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025

Latest Alerts

JackFix Spreads Stealers Via Fake Updates

RomCom Uses Fake Updates To Spread Malware

Chrome Addon Injects Hidden Solana Fees

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Subscribe to our newsletter

    Latest Incidents

    Exchange Online Outage Blocks Mail

    CodeRED Cyberattack Disrupts Alerts

    Hacker Takes Over Houston Radio Airwaves

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial