Cybersecurity researchers at Socket have uncovered a sophisticated malware operation targeting Solana traders through a compromised Chrome browser extension. The malicious software has been systematically diverting cryptocurrency assets from unsuspecting users for several months before detection.
The extension, which presented itself as a legitimate trading tool, contained concealed code that executed secondary transaction instructions during routine token swaps. This covert mechanism automatically siphoned portions of SOL cryptocurrency from users’ wallets while maintaining the appearance of normal trading operations. The hidden fee structure operated transparently within the interface, making detection particularly challenging for average users.
Security analysts note that the extension’s ability to mask unauthorized transactions represents an evolution in cryptocurrency theft techniques. Unlike traditional phishing attacks, this method leveraged users’ trust in established browser extensions to facilitate ongoing financial drainage. The discovery highlights growing concerns about extension-based security vulnerabilities within the cryptocurrency ecosystem.
Socket’s investigation revealed the malware had been active for an extended period, accumulating stolen funds through numerous small transactions that often went unnoticed by victims. The firm recommends that Solana traders conduct thorough security audits of all installed browser extensions and monitor transaction histories for any suspicious activity. This incident underscores the critical need for enhanced security protocols when interacting with decentralized finance platforms through third-party tools.

