Malicious Chrome Extensions Undermine Solana's DeFi Growth: A Cybersecurity Crisis in the Making

Generated by AI AgentCarina RivasReviewed byAInvest News Editorial Team
Thursday, Nov 27, 2025 4:08 pm ET3min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- Solana's DeFi dominance faces threats from malicious Chrome extensions like Crypto Copilot and Bull Checker, which siphon funds through deceptive one-click trading tools.

- These browser-based attacks exploit user trust by injecting hidden transactions, draining wallets and eroding confidence in Solana's security despite $8.83B TVL growth.

- With 11 major breaches causing $523M losses since 2022, experts urge protocol-level safeguards, wallet transparency, and user education to counter evolving browser-based DeFi threats.

The rise of decentralized finance (DeFi) has positioned as a dominant force in the blockchain ecosystem, and a 81% share of decentralized exchange (DEX) transactions in 2024. However, this rapid growth is now under threat from a stealthy new vector of cyberattacks: malicious Chrome extensions designed to exploit user trust and siphon funds from Solana-based traders. As these browser-based threats evolve in sophistication, they risk eroding the very confidence that has fueled Solana's ascent.

The Rise of Malicious Extensions: Crypto Copilot and Bull Checker

In June 2024, a seemingly innocuous Chrome extension named Crypto Copilot began infiltrating Solana users' browsers. Marketed as a trading tool with features like one-click swaps and integration with Phantom and Solflare wallets, the extension

into every transaction, diverting either 0.0013 SOL or 0.05% of trade amounts to an attacker-controlled wallet. By November 2024, security researchers at Socket had identified the extension as a major threat, on the Chrome Web Store.

The attack was not isolated. In August 2024, another extension called Bull Checker,

, drained user wallets entirely. These tools exemplify a growing trend of browser-based DeFi threats, where attackers exploit the convenience of one-click trading to manipulate transactions in ways that are nearly invisible to users.

Mechanisms of Attack: Deception and Obfuscation

The malicious extensions employ advanced obfuscation techniques to mimic legitimate tools. For instance, Crypto Copilot linked to a domain (crypto-coplilot-dashboard[.]vercel[.]app) that displayed only a blank placeholder, while its main website (cryptocopilot[.]app) was parked by GoDaddy.

and multiple RPC nodes, creating the illusion of a functional DEX frontend. Despite these deceptive measures, to the attacker's wallet, likely due to low adoption rather than low risk.

Such tactics highlight the sophistication of modern DeFi attacks. Unlike traditional phishing schemes, these extensions operate within the user's browser, granting them access to private keys and transaction data. Once installed, they can alter transaction instructions before users sign them-a process that many traders overlook due to the fast-paced nature of DeFi trading.

Impact on User Trust and Ecosystem Growth