Attackers are using a malicious Google Chrome extension disguised as a trading convenience tool to nick small portions of SOL out of the pockets of unsuspecting Solana users.According to research conducted by cybersecurity firm Socket, the Chrome extension is currently still live on the Chrome Web Store under the name “Crypto Copilot.” It’s being marketed as a productivity enhancer that lets users execute Solana trades directly from their X feed.The extension currently has a 1-star rating and only 18 downloads as of press time, but has been live since June 18, 2024.How is Crypto Copilot targeting Solana users?At first glance, Crypto Copilot ticks all the boxes of a legitimate tool, integrating various third-party APIs like DexScreener for price data, Helius for Solana infrastructure access, and Phantom or Solflare for wallet connections. These features make it look and function like a genuine decentralized trading interface, while it quietly siphons off a hidden fee in the background.“None of these services are malicious by themselves, but together they create a convincing façade around the core issue: every swap includes an undisclosed SOL transfer to a hardcoded personal wallet,” Socket wrote.For executing trades, it uses Raydium, a decentralized exchange on Solana that allows users to swap tokens. But behind the scenes, it appends an extra instruction that transfers a small cut of the transaction to the attacker’s wallet.On the surface, the user sees only the expected swap details. The wallet confirmation screens simply summarise the transaction without surfacing individual instructions, giving no obvious indication that two actions are being executed together.When executing trades, users are only asked to approve the transaction once, with both the legitimate and malicious instructions executing together as a single atomic operation.On-chain analysis conducted by Socket found only a limited number of transfers to the attacker’s wallet so far, which the team attributes to the fact that the extension has either not been widely promoted or is still in the early stages of distribution.However, the extension has been built to scale efficiently, with Socket warning that the potential damage increases with the size and frequency of trades.“Users with larger holdings or high-volume trading activity could incur substantially higher losses if they unknowingly rely on this extension for routine swaps. Over time, the attacker accumulates SOL directly inside their personal wallet, turning the extension into a recurring revenue mechanism rather than a legitimate DEX interface,” Socket added.Socket has urged users to review every transaction instruction before signing, especially on Solana, where malicious behaviour like this can only be caught if a user manually expands and inspects each instruction.Those who have already installed Crypto Copilot should migrate their funds to a clean wallet and revoke all previously connected sites immediately.Malicious Chrome extensions continue to surfaceCrypto Copilot is just one of many deceptive Chrome extensions that have surfaced on the Chrome Web Store. Since the start of last year, the number of attacks using malicious extensions has been on the rise, with some managing to rake in millions in stolen funds.Last year, Invezz reported on Bull Checker, another fake extension that targeted Solana users by disguising itself as a memecoin utility. In reality, it hijacked transactions to reroute user funds to an attacker-controlled wallet.Meanwhile, back in August, researchers at Koi Security uncovered that a group known as GreedyBear had siphoned over $1 million worth of cryptocurrency using malicious browser extensions, malware, and scam websites in a coordinated operation spanning multiple attack vectors.The post Google Chrome extension for crypto trading targets Solana users appeared first on InvezzAttackers are using a malicious Google Chrome extension disguised as a trading convenience tool to nick small portions of SOL out of the pockets of unsuspecting Solana users.According to research conducted by cybersecurity firm Socket, the Chrome extension is currently still live on the Chrome Web Store under the name “Crypto Copilot.” It’s being marketed as a productivity enhancer that lets users execute Solana trades directly from their X feed.The extension currently has a 1-star rating and only 18 downloads as of press time, but has been live since June 18, 2024.How is Crypto Copilot targeting Solana users?At first glance, Crypto Copilot ticks all the boxes of a legitimate tool, integrating various third-party APIs like DexScreener for price data, Helius for Solana infrastructure access, and Phantom or Solflare for wallet connections. These features make it look and function like a genuine decentralized trading interface, while it quietly siphons off a hidden fee in the background.“None of these services are malicious by themselves, but together they create a convincing façade around the core issue: every swap includes an undisclosed SOL transfer to a hardcoded personal wallet,” Socket wrote.For executing trades, it uses Raydium, a decentralized exchange on Solana that allows users to swap tokens. But behind the scenes, it appends an extra instruction that transfers a small cut of the transaction to the attacker’s wallet.On the surface, the user sees only the expected swap details. The wallet confirmation screens simply summarise the transaction without surfacing individual instructions, giving no obvious indication that two actions are being executed together.When executing trades, users are only asked to approve the transaction once, with both the legitimate and malicious instructions executing together as a single atomic operation.On-chain analysis conducted by Socket found only a limited number of transfers to the attacker’s wallet so far, which the team attributes to the fact that the extension has either not been widely promoted or is still in the early stages of distribution.However, the extension has been built to scale efficiently, with Socket warning that the potential damage increases with the size and frequency of trades.“Users with larger holdings or high-volume trading activity could incur substantially higher losses if they unknowingly rely on this extension for routine swaps. Over time, the attacker accumulates SOL directly inside their personal wallet, turning the extension into a recurring revenue mechanism rather than a legitimate DEX interface,” Socket added.Socket has urged users to review every transaction instruction before signing, especially on Solana, where malicious behaviour like this can only be caught if a user manually expands and inspects each instruction.Those who have already installed Crypto Copilot should migrate their funds to a clean wallet and revoke all previously connected sites immediately.Malicious Chrome extensions continue to surfaceCrypto Copilot is just one of many deceptive Chrome extensions that have surfaced on the Chrome Web Store. Since the start of last year, the number of attacks using malicious extensions has been on the rise, with some managing to rake in millions in stolen funds.Last year, Invezz reported on Bull Checker, another fake extension that targeted Solana users by disguising itself as a memecoin utility. In reality, it hijacked transactions to reroute user funds to an attacker-controlled wallet.Meanwhile, back in August, researchers at Koi Security uncovered that a group known as GreedyBear had siphoned over $1 million worth of cryptocurrency using malicious browser extensions, malware, and scam websites in a coordinated operation spanning multiple attack vectors.The post Google Chrome extension for crypto trading targets Solana users appeared first on Invezz

Google Chrome extension for crypto trading targets Solana users

2025/11/28 00:19
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Attackers are using a malicious Google Chrome extension disguised as a trading convenience tool to nick small portions of SOL out of the pockets of unsuspecting Solana users.

According to research conducted by cybersecurity firm Socket, the Chrome extension is currently still live on the Chrome Web Store under the name “Crypto Copilot.”

It’s being marketed as a productivity enhancer that lets users execute Solana trades directly from their X feed.

The extension currently has a 1-star rating and only 18 downloads as of press time, but has been live since June 18, 2024.

How is Crypto Copilot targeting Solana users?

At first glance, Crypto Copilot ticks all the boxes of a legitimate tool, integrating various third-party APIs like DexScreener for price data, Helius for Solana infrastructure access, and Phantom or Solflare for wallet connections. 

These features make it look and function like a genuine decentralized trading interface, while it quietly siphons off a hidden fee in the background.

“None of these services are malicious by themselves, but together they create a convincing façade around the core issue: every swap includes an undisclosed SOL transfer to a hardcoded personal wallet,” Socket wrote.

For executing trades, it uses Raydium, a decentralized exchange on Solana that allows users to swap tokens.

But behind the scenes, it appends an extra instruction that transfers a small cut of the transaction to the attacker’s wallet.

On the surface, the user sees only the expected swap details.

The wallet confirmation screens simply summarise the transaction without surfacing individual instructions, giving no obvious indication that two actions are being executed together.

When executing trades, users are only asked to approve the transaction once, with both the legitimate and malicious instructions executing together as a single atomic operation.

On-chain analysis conducted by Socket found only a limited number of transfers to the attacker’s wallet so far, which the team attributes to the fact that the extension has either not been widely promoted or is still in the early stages of distribution.

However, the extension has been built to scale efficiently, with Socket warning that the potential damage increases with the size and frequency of trades.

“Users with larger holdings or high-volume trading activity could incur substantially higher losses if they unknowingly rely on this extension for routine swaps. Over time, the attacker accumulates SOL directly inside their personal wallet, turning the extension into a recurring revenue mechanism rather than a legitimate DEX interface,” Socket added.

Socket has urged users to review every transaction instruction before signing, especially on Solana, where malicious behaviour like this can only be caught if a user manually expands and inspects each instruction.

Those who have already installed Crypto Copilot should migrate their funds to a clean wallet and revoke all previously connected sites immediately.

Malicious Chrome extensions continue to surface

Crypto Copilot is just one of many deceptive Chrome extensions that have surfaced on the Chrome Web Store.

Since the start of last year, the number of attacks using malicious extensions has been on the rise, with some managing to rake in millions in stolen funds.

Last year, Invezz reported on Bull Checker, another fake extension that targeted Solana users by disguising itself as a memecoin utility.

In reality, it hijacked transactions to reroute user funds to an attacker-controlled wallet.

Meanwhile, back in August, researchers at Koi Security uncovered that a group known as GreedyBear had siphoned over $1 million worth of cryptocurrency using malicious browser extensions, malware, and scam websites in a coordinated operation spanning multiple attack vectors.

The post Google Chrome extension for crypto trading targets Solana users appeared first on Invezz

Market Opportunity
Solana Logo
Solana Price(SOL)
$91.62
$91.62$91.62
+1.86%
USD
Solana (SOL) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

XRP Price Prediction: XRP Trapped At $1.37 As Breakout Setup Tightens

XRP Price Prediction: XRP Trapped At $1.37 As Breakout Setup Tightens

The post XRP Price Prediction: XRP Trapped At $1.37 As Breakout Setup Tightens appeared on BitcoinEthereumNews.com. XRP trades at $1.3771, down 0.53%, pressing
Share
BitcoinEthereumNews2026/03/24 01:08
Why Digital Banks Are Growing 3x Faster Than Traditional Banks

Why Digital Banks Are Growing 3x Faster Than Traditional Banks

The Growth Gap Between Digital and Traditional Banking Digital banks are acquiring customers at approximately three times the rate of their traditional counterparts
Share
Techbullion2026/03/24 00:50
Analyst Predicts ‘Uptober’ Rally for BTC Regardless of FOMC Decision

Analyst Predicts ‘Uptober’ Rally for BTC Regardless of FOMC Decision

The post Analyst Predicts ‘Uptober’ Rally for BTC Regardless of FOMC Decision appeared on BitcoinEthereumNews.com. Bitcoin traded at $116,236 as of 14:04 UTC on Sept. 17, up about 1% in the past 24 hours, holding above a key level as markets await the Federal Reserve’s policy announcement. Analysts’ comments Dean Crypto Trades noted on X that bitcoin is only about 7% above its post-election local peak, while the S&P 500 has risen 9% and gold has surged 36% during the same period. He said bitcoin has compressed more than those assets, making it likely to lead the next larger move, though it could form a “lower high” before extending further. He added that ether could join in once it breaks $5,000 and enters price discovery. Lark Davis pointed to bitcoin’s history around September FOMC meetings, saying every September decision since 2020 — except during the 2022 bear market — has preceded a strong rally. He stressed that the pattern is less about the Fed’s rate choice itself and more about seasonal dynamics, arguing that bitcoin tends to thrive in this period heading into “Uptober.” CoinDesk Research’s technical analysis According to CoinDesk Research’s technical analysis data model, bitcoin rose about 0.9% during the Sept. 16–17 analysis window, climbing from $115,461 to $116,520. BTC reached a session high of $117,317 at 07:00 UTC on Sept. 17 before consolidating. Following that peak, bitcoin tested the $116,400–$116,600 range multiple times, confirming it as a short-term support zone. In the final hour of the session, between 11:39 and 12:38 UTC, BTC attempted a breakout: prices moved narrowly between $116,351 and $116,376 before spiking to $116,551 at 12:34 on higher volume. This confirmed a consolidation-breakout pattern, though the gains were modest. Overall, bitcoin remains firm above $116,000, with support around $116,400 and resistance near $117,300. Latest 24-hour and one-month chart analysis The latest 24-hour CoinDesk Data chart, ending 14:04 UTC on…
Share
BitcoinEthereumNews2025/09/18 12:42