ChainStreet
WHERE CODE MEETS CAPITAL
Loading prices…
Powered by CoinGecko
Blockchain Tech

New Security Alert: Crypto Copilot Chrome Extension Skims Solana Swaps

Cybersecurity researchers have identified Crypto Copilot, a malicious browser extension actively skimming funds from Solana traders by injecting hidden transfer instructions into legitimate Raydium swaps.

New Security Alert: Crypto Copilot Chrome Extension Skims Solana Swaps

A malicious Google Chrome extension dubbed Crypto Copilot is actively compromising the Solana ecosystem by injecting hidden code into Raydium swaps to siphon fees from unsuspecting traders. The malware, which masquerades as a convenience tool for executing trades directly from social media feeds, represents a dangerous evolution in browser-based crypto-jacking by skimming small amounts per transaction rather than draining wallets entirely.

Key Takeaways
  • Malware Discovery: A Chrome extension named "Crypto Copilot" disguises itself as a trading tool for X (Twitter) but secretly modifies transactions to siphon user funds.
  • The Skimming Mechanism: The malware injects a hidden command into Raydium swaps, transferring a 0.05% fee (or minimum 0.0013 SOL) to the attacker without the user’s knowledge.
  • Deceptive Tactics: The developer obfuscated the malicious code within the extension's bundle and utilized legitimate APIs to evade detection by the Chrome Web Store.
Listen to this article

Anatomy of the Crypto Copilot ‘Skim’

According to a recent report by cybersecurity firm Socket, the malware operates by manipulating the transaction construction process on the backend. The extension markets itself as a utility that allows users to trade Solana tokens directly from the X (formerly Twitter) interface.

However, researchers found that when a user initiated a swap on the Raydium decentralized exchange (DEX), the extension’s code atomically appended a secondary instruction: SystemProgram.transfer. 

This hidden instruction routed a “fee,” calculated as the greater of 0.0013 SOL or 0.05% of the transaction value, to a hardcoded wallet address controlled by the malware’s creator. Because Solana wallets often summarize transaction data in the high-level approval window, the secondary transfer was frequently obscured from the user, who believed they were signing a single standard swap instruction.

Technical Obfuscation and Infrastructure

The threat actors employed significant measures to conceal the malicious activity. The investigation revealed that the fee extraction logic was buried under layers of obfuscated JavaScript, utilizing aggressive variable renaming and minification to evade automated security scans.

Advertisement · Press Release

Genuine News Deserves Honest Attention.

High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.

👉 Submit Your PR

Furthermore, the extension attempted to establish a veneer of legitimacy by utilizing valid RPCs from providers such as Helius and DexScreener to fetch real-time pricing data. However, the software also communicated with a suspicious backend hosted on a misspelled domain (crypto-coplilot-dashboard.vercel.app). 

Researchers noted that the lack of documentation and the “placeholder” nature of the dashboard were consistent with malicious software practices designed solely to harvest wallet metadata.

Crypto Copilot Developer and Distribution

The extension was reportedly published to the Chrome Web Store under the developer name “sjclark76” around May 7, 2024. While the extension showed a relatively low install count of approximately 15 users at the time of the report, security analysts warned that the underlying mechanism posed a disproportionate risk to high-volume traders. 

Unlike “drainers” that trigger immediate alarms, this “skimmer” approach allowed the attacker to potentially operate undetected over long periods. Socket confirmed it submitted a takedown request to Google. 

This incident followed a broader trend of supply-chain attacks targeting browser ecosystems; earlier in 2024, security firms identified over 40 malicious extensions impersonating major wallet providers on the Firefox browser.

Chain Street’s Take

Crypto Copilot is a reminder that the most dangerous attacks aren’t the loud ones. Quiet skimmers that slip extra instructions into otherwise routine Solana swaps are harder to spot and hit traders where they’re least prepared. The risk isn’t the install count but the technique. Any tool sitting in the browser layer now deserves the same scrutiny as a smart contract audit.

CHAIN STREET INTELLIGENCE

Activate Intelligence Layer

Institutional-grade structural analysis for this article.

FAQ

Frequently Asked Questions

01

Q: How do I check if I am infected?

A: Open your Chrome browser, go to chrome://extensions, and look for "Crypto Copilot." If it is installed, remove it immediately.
02

Did this malware steal private keys?

A: There is no evidence it stole private keys. Instead, it modified transaction requests before you signed them. However, if you installed it, it is best practice to move funds to a new wallet as a precaution.
03

Is the Raydium DEX safe to use?

A: Yes. The Raydium protocol itself was not compromised. The malware operated entirely within the user's browser, hijacking the interface before the transaction reached the blockchain.

You Might Also Like

CHAINSTREET
🛡
Alex Reeve

Alex Reeve is a contributing writer for ChainStreet.io. Her articles provide timely insights and analysis across these interconnected industries, including regulatory updates, market trends, token economics, institutional developments, platform innovations, stablecoins, meme coins, policy shifts, and the latest advancements in AI, applications, tools, models, and their broader implications for technology and markets.

The views and opinions expressed by Alex in this article are her own and do not necessarily reflect the official position of ChainStreet.io, its management, editors, or affiliates. This content is provided for informational and educational purposes only and does not constitute financial, investment, legal, or tax advice. Readers should conduct their own research and consult qualified professionals before making any decisions related to digital assets, cryptocurrencies, or financial matters. ChainStreet.io and its contributors are not responsible for any losses incurred from reliance on this information.