Crypto News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Crypto Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CryptoNewsSolana Traders Hit by Months-Long Browser Malware That Skimmed Every Swap
Solana Traders Hit by Months-Long Browser Malware That Skimmed Every Swap
Crypto

Solana Traders Hit by Months-Long Browser Malware That Skimmed Every Swap

•November 28, 2025
0
CoinDesk
CoinDesk•Nov 28, 2025

Why It Matters

The attack demonstrates how UI‑level abstractions can mask exploit vectors, threatening user assets and eroding confidence in blockchain trading platforms. It forces the industry to prioritize transparent transaction flows and rigorous security audits.

Key Takeaways

  • •Malicious extension injected hidden instructions into swaps
  • •Affected traders lost millions across multiple wallets
  • •Attack exploited atomic transaction bundling
  • •Detection took months due to subtle behavior
  • •Security audits now emphasize UI verification

Pulse Analysis

The breach originated from a seemingly innocuous browser extension that intercepted Solana swap calls. By embedding an extra instruction into the transaction bundle, the malware siphoned a fraction of each trade without altering the visible swap parameters. Solana’s design, which executes bundled instructions atomically, meant that once a user signed the transaction, both the legitimate swap and the hidden transfer were processed together, leaving no obvious on‑chain trace of tampering.

Across several months, the covert operation drained millions of dollars from unsuspecting traders, affecting wallets that relied on popular web‑based interfaces. Researchers identified the pattern only after correlating unexplained token outflows with specific browser versions and extension identifiers. In response, major wallet providers issued emergency patches, revoked compromised extensions, and launched user education campaigns emphasizing the verification of transaction details before signing. The incident has sparked a broader conversation about the security posture of DeFi front‑ends, prompting firms to integrate real‑time transaction monitoring and anomaly detection tools.

Looking forward, the Solana malware episode underscores the need for deeper transparency in decentralized finance. Developers are urged to expose granular instruction data within UI layers, allowing users to audit every operation before approval. Independent security audits now prioritize UI/UX assessments alongside smart‑contract code reviews. As regulators scrutinize crypto‑related consumer protection, platforms that champion clear, auditable transaction flows will gain a competitive edge, reinforcing trust in the rapidly evolving blockchain ecosystem.

Solana Traders Hit by Months-Long Browser Malware That Skimmed Every Swap

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...