Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Chrome Extension Draining Solana DeFi Users’ Funds
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Chrome Extension Draining Solana DeFi Users’ Funds
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Malicious Chrome Extension Draining Solana DeFi Users’ Funds

Security

Malicious Chrome Extension Draining Solana DeFi Users’ Funds

A malicious Chrome extension has been found to be responsible for the loss of funds among Solana DeFi users.

Marco Rizal
Last updated: September 15, 2024 12:16 pm
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Malicious Chrome Extension Draining Solana DeFi Users Funds
SHARE

Last week, there were reports of a few Solana decentralized finance (DeFi) users who unfortunately lost their funds.

According to cybersecurity experts from Jupiter Research, they have identified the source of the theft as a Chrome extension called “Bull Checker” after conducting a thorough investigation.

This extension specifically targeted users on Solana-related subreddits and secretly siphoned off their tokens without raising any alarms from the users' wallets.

The “Bull Checker” extension was advertised as a helpful instrument for monitoring memecoin holders. However, the developers had more evil motives hiding in the shadows.

Although it seemed trustworthy, this extension took advantage of its extensive permissions to access and modify data on all websites, including decentralized applications (dApps) that users engaged with.

image 16
Credits: Jupiter Research

Users experienced no issues when installing Bull Checker and conducting transactions on Solana dApps.

The extension provided accurate transaction simulations, giving users a false sense of security. After the transaction was finished, the extension secretly included harmful instructions that redirected the tokens to a hacker's wallet.

Bull Checker was created to fly under the radar and avoid arousing any suspicion.

During the transaction simulation phase, which usually detects malicious activity, the extension was smart enough to abort its attack if the user's balance was insufficient, effectively bypassing initial checks.

However, once the simulation was complete, the attacker bundled together several transactions and siphoned off funds.

In one example, a user lost 0.06 SOL without realizing it, when they unintentionally approved a transaction that gave the hacker control over their token authority.

Though it left a puzzle for many users as to what caused their crypto to be drained, the Jupiter Research team found an unexpected issue with the Bull Checker extension.

Originally designed to have read-only capabilities, it was discovered that the extension had the ability to both read and modify data on all websites.

It was able to monitor Solana wallets, intercept transactions, and manipulate them by sending unsigned transactions to a remote server.

The server would attach a malicious payload to the transaction, which would transform a legitimate transfer into a theft.

image 17
Credits: Jupiter Research

Shockingly, Bull Checker was even promoted on Reddit by some users, who specifically aimed at memecoin traders and persuaded them to install the harmful extension.

More Stories

Cloudflare Fends Off History’s Largest DDoS Attack

Fortinet’s FortiManager Zero-Day Flaw News Spreads Faster Than Their Fix

Voldemort’s New Spell Now Targets Taxpayers Instead

Fake VPN Downloads Lead to Dangerous WikiLoader Malware

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Google Patches Serious Android Security Flaws in September Update

Google Patches Serious Android Security Flaws in September Update

WordPress Malware Creates Hidden Admins Accounts While Your Security Tools Are Clueless

New WordPress Malware Creates Hidden Admins Accounts While Your Security Tools Are Clueless

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Fortinet Got Hacked and the Hackers Name is the Icing on the Cake

Fortinet Got Hacked, and the Hacker’s Name is the Icing on the Cake

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?