In short
- Chrome extension Crypto Copilot secretly provides a hidden SOL switch to each Raydium swap, siphoning charges to an attacker’s pockets.
- Safety platform Socket discovered the extension makes use of obfuscated code and a misspelled, inactive backend area to masks its exercise.
- On-chain theft stays small to date, however the mechanism scales with commerce measurement, and the extension remains to be dwell on the Chrome Net Retailer.
A Chrome extension marketed as a handy buying and selling instrument has been secretly siphoning SOL from customers’ swaps since final June, injecting hidden charges into each transaction whereas masquerading as a authentic Solana buying and selling assistant.
Cybersecurity agency Socket found malware extension Crypto Copilot throughout “steady monitoring” of the Chrome Net Retailer, safety engineer and researcher Kush Pandya advised Decrypt.
🚨 Socket researchers uncovered a malicious Chrome extension that injects hidden #SOL transfers into Raydium swaps, quietly siphoning charges to an attacker pockets.
Full evaluation → https://t.co/bdGOXViJpA #Solana
— Socket (@SocketSecurity) November 25, 2025
In an evaluation of the malicious extension revealed Wednesday, Pandya wrote that Crypto Copilot quietly appends an additional switch instruction to each Solana swap, extracting a minimal of 0.0013 SOL or 0.05% of the commerce quantity to an attacker-controlled pockets.
“Our AI scanner flagged a number of indicators: aggressive code obfuscation, a hardcoded Solana tackle embedded in transaction logic, and discrepancies between the extension’s said performance and precise community conduct,” Pandya advised Decrypt, including that “These alerts triggered deeper handbook evaluation that confirmed the hidden price extraction mechanism.”
The analysis factors to dangers in browser-based crypto instruments, significantly extensions that mix social media integration with transaction signing capabilities.
The extension has remained obtainable on the Chrome Net Retailer for months, with no warning to customers in regards to the undisclosed charges buried in closely obfuscated code, the report says.
“The price conduct isn’t disclosed on the Chrome Net Retailer itemizing, and the logic implementing it’s buried inside closely obfuscated code,” Pandya famous.
Every time a person swaps tokens, the extension generates the right Raydium swap instruction however discreetly tacks on an additional switch directing SOL to the attacker’s tackle.
Raydium is a Solana-based decentralized change and automatic market maker, whereas a “Raydium swap” merely refers to exchanging one token for an additional via its liquidity swimming pools.
Customers who put in Crypto Copilot, believing it might streamline their Solana buying and selling, have unknowingly been paying hidden charges with each swap, charges that by no means appeared within the extension’s advertising supplies or Chrome Net Retailer itemizing.
The interface reveals solely the swap particulars, and pockets pop-ups summarize the transaction, so customers signal what seems to be like a single swap despite the fact that each directions execute concurrently on-chain.
The attacker’s pockets has acquired solely small quantities so far, an indication that Crypto Copilot hasn’t reached many customers but, moderately than a sign that the exploit is low-risk, as per the report.
The price mechanism scales with commerce measurement, as for swaps beneath 2.6 SOL, the minimal 0.0013 SOL price applies, and above that threshold, the 0.05% proportion price takes impact, which means a 100 SOL swap would extract 0.05 SOL, roughly $10 at present costs.
The extension’s primary area cryptocopilot[.]app is parked by area registry GoDaddy, whereas the backend at crypto-coplilot-dashboard[.]vercel[.]app, notably misspelled, shows solely a clean placeholder web page regardless of amassing pockets information, the report says.
Socket has submitted a takedown request to Google’s Chrome Net Retailer safety group, although the extension remained obtainable on the time of publication.
The platform has urged customers to evaluate every instruction earlier than signing transactions, keep away from closed-source buying and selling extensions requesting signing permissions, and migrate property to scrub wallets in the event that they put in Crypto Copilot.
Malware patterns
Malware stays a rising concern for crypto customers. In September, a malware pressure known as ModStealer was discovered concentrating on crypto wallets throughout Home windows, Linux, and macOS via faux job recruiter advertisements, evading detection by main antivirus engines for nearly a month.
Ledger CTO Charles Guillemet has beforehand warned that attackers had compromised an NPM developer account, with malicious code making an attempt to silently swap crypto pockets addresses throughout transactions throughout a number of blockchains.
Every day Debrief E-newsletter
Begin daily with the highest information tales proper now, plus authentic options, a podcast, movies and extra.

