top of page

Hidden Danger: Chrome Extension Exploits Solana Wallets

  • Nov 27, 2025
  • 2 min read

Key Findings


  • Cybersecurity researchers have discovered a malicious Chrome extension named "Crypto Copilot" that injects hidden Solana transfer fees into Raydium swap transactions.

  • The extension silently appends an extra transfer instruction to each swap, siphoning a minimum of 0.0013 SOL or 0.05% of the trade amount to an attacker-controlled wallet.

  • The malicious behavior is concealed through obfuscation techniques, and the extension's user interface only shows the legitimate swap details, hiding the theft.

  • The extension communicates with a backend infrastructure that appears to be designed to pass Chrome Web Store review and provide a veneer of legitimacy.


Background


The "Crypto Copilot" Chrome extension was first published on May 7, 2024, by a user named "sjclark76". The developer describes the extension as offering the ability to "trade crypto directly on X with real-time insights and seamless execution."


Malicious Behavior


  • The extension injects an extra "SystemProgram.transfer" instruction into every Raydium swap transaction, sending a portion of the funds to a hardcoded attacker-controlled wallet.

  • The fee is calculated based on the amount traded, with a minimum of 0.0013 SOL or 0.05% of the swap amount if it's more than 2.6 SOL.

  • The malicious behavior is concealed through techniques like minification and variable renaming, making it difficult to detect.


Backend Infrastructure


  • The extension communicates with a backend hosted on the domain "crypto-coplilot-dashboard.vercel[.]app" to register connected wallets, fetch points and referral data, and report user activity.

  • The domain, along with "cryptocopilot[.]app," does not host any real product, indicating the illegitimate nature of the tool.

  • The extension also embeds a Helius RPC API key directly in the client code, exposing sensitive credentials that could be abused.


Impact and Mitigation


  • The hidden nature of the theft makes it difficult for users to detect, as the user interface only shows the legitimate swap details.

  • The extension remains available on the Chrome Web Store, and Socket has submitted a takedown request to Google.

  • Users are advised to exercise caution when using third-party crypto-related extensions and to carefully review transaction details before signing.


Sources


  • https://thehackernews.com/2025/11/chrome-extension-caught-injecting.html

  • https://securityonline.info/hidden-theft-crypto-copilot-chrome-extension-drains-solana-wallets-on-x/

  • https://www.reddit.com/r/SecOpsDaily/comments/1p75z59/chrome_extension_caught_injecting_hidden_solana/

  • https://x.com/TheCyberSecHub/status/1993646721377935603

  • https://www.xt.com/en/blog/post/chrome-extension-caught-injecting-hidden-solana-transfer-fees-into-raydium-swaps-the-hacker-news

  • https://www.cypro.se/2025/11/26/chrome-extension-caught-injecting-hidden-solana-transfer-fees-into-raydium-swaps/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page