Cookie banner
We Value Your Privacy
We use cookies and similar technologies to enhance your browsing experience, analyze site traffic, and personalize content. By clicking “Accept All,” you consent to the use of all cookies. You can manage your preferences or learn more by clicking “Settings.”
For detailed information, please review ourPrivacy Policy.
Logo
wallet icon

Not connected

Buidl with Asvoria
Build with Asvoria.app — Launch Smarter, Faster!

Instantly create stunning AI-powered web apps and games for your next big project on Asvoria.app. No coding. No waiting. Just launch.


Solana Traders Caught by Silent Browser Malware That Skimmed Every Swap for Months

The Block Whisperer

November 28, 2025 at 10:47 AMby The Block Whisperer

Views

+5

Shares

+0

A stealthy browser extension malware has been stealing value from Solana traders by hijacking swaps and hiding extra instructions inside bundled transactions.

Solana Traders Caught by Silent Browser Malware That Skimmed Every Swap for Months
Web3 insights in your social media feed

A quiet attack that lasted far too long

For several months a group of Solana traders noticed missing tokens, slippage that made no sense and small unexplained losses after perfectly normal swaps. Nothing looked wrong on the surface. Wallets showed a single clean swap. The interface looked trustworthy. Gas fees looked normal.

Only later did security researchers uncover the truth. A malicious browser extension had been quietly intercepting swap data before it reached the wallet. It injected an extra instruction into the bundle and routed a fraction of the output to the attacker. Because Solana executes the entire bundle as a single atomic transaction, traders simply signed it without noticing anything strange.

The attack was subtle. There were no pop ups, no red flags and no strange permissions. Once installed, the malware only needed to change a tiny part of each outgoing swap. Most users lost amounts small enough that they blamed slippage or pool depth rather than an attack.

How the malware worked

Injection at the browser level

The extension watched for swap requests in real time. When a user prepared a trade, the malware captured the instruction data and modified it before it reached the wallet.

Bundled transactions hid the theft

Most Solana wallets show a single simplified message for a swap. The full bundle often contains multiple instructions. Users saw only the high level summary. The hidden instruction sent a small portion of the output to the attacker’s address.

Atomic execution made it invisible

Solana executes bundles as a single all or nothing action. If the malicious instruction was present the entire transaction still looked valid. There was no obvious sign that anything unusual had been added.

Small amounts kept the attack under the radar

The malware skimmed just enough to avoid suspicion. Victims often noticed a little less than expected but assumed it was normal market movement.

Why traders struggled to detect the problem

Most wallet interfaces aim to make crypto easier by summarizing complex transactions into simple messages. This is normally helpful, but in this case it created the perfect cover.

Users signed what looked like a routine swap. They had no way to inspect the hidden instruction unless they opened the full expanded transaction. Even then the attack was well crafted and technical, so most non developers would not know what they were looking at.

The malware also targeted active traders, who often sign many transactions quickly. A few missing tokens here and there did not seem alarming at first.

Who is affected and how much was stolen

Investigators believe the malware has been active for several months. Losses vary widely. Some users lost tiny amounts per swap. Others lost more during higher volume trades. Because the malware took only small percentages, the total stolen amount is still being calculated.

What is clear is that this was not a typical phishing attack. Victims never gave away seed phrases or private keys. The attackers simply intercepted swap data and exploited the gap between what users see and what the blockchain actually executes.

What Solana users should do now

  • Remove any unfamiliar browser extensions
  • Review the full transaction details before signing, not only the summary
  • Use dedicated trading browsers that minimize extension risk
  • Consider hardware wallets for all high value activity
  • Check recent swap history for small consistent losses

Solana itself was not exploited. The blockchain worked exactly as designed. The vulnerability lived in the user’s own browser, which is often the weakest part of any crypto setup.

A reminder about convenience and security

Wallets and trading tools try to simplify things. The more they hide technical details, the easier it becomes for attackers to slip inside that hidden space.

The lesson here is not to make trading harder. It is simply to stay aware that bundled transactions contain more information than the interface displays. As the ecosystem grows, attackers look for quiet ways to profit without alerting the user.

This malware stayed active for months because it was thoughtful, patient and designed to blend in. Now that it has been exposed, users should take a moment to clean up their browsers and trading environments.

#malware
#solana

Explore more articles like this

Subscribe to Asvoria News to receive all the latest news.

Stay ahead with exclusive press releases and expert insights on Web3 and the Spatial Web. Be the first to hear about Asvoria’s latest innovations, events, and updates. Join us — subscribe today!

© 2025 Asvoria. All rights reserved.

Avoria does not endorse or promote investment in any of the tokens or NFT projects featured on this platform.
We accept no responsibility for any losses incurred. Users should conduct their own research and consult with a financial advisor before investing.
For more information about Doing Your Own Research (DYOR), please visit this link.