🚨 URGENT: GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data!

⚠️ THREAT ALERT: 🚨 URGENT: GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data!

A sophisticated new malware strain dubbed GlassWorm is actively exploiting the Solana blockchain for covert command and control, turning public transaction ledgers into invisible dead drops for remote access trojans. This evasive payload bypasses traditional network security by embedding encrypted instructions within legitimate-looking Solana transactions, allowing attackers to silently deliver and reconfigure the RAT on compromised systems without triggering conventional domain or IP-based alerts. The malware is designed to prey on the explosive growth of cryptocurrency users, specifically targeting browser-stored credentials, session cookies, and cryptocurrency wallet private keys with surgical precision.

The attack chain begins with a phishing lure or compromised software drop, after which GlassWorm establishes persistence and begins scanning the infected host for valuable data. It exfiltrates saved passwords, autofill forms, and two-factor authentication tokens from Chrome, Firefox, and Edge browsers, while simultaneously hunting for wallet.dat files, seed phrases, and browser-based wallet extensions like MetaMask and Phantom. All stolen data is staged and then smuggled out through the same Solana blockchain dead drop mechanism, with each transaction acting as a encrypted data packet that blends into the millions of daily transactions, making detection nearly impossible for standard monitoring tools.

This is not a theoretical future threat—GlassWorm is currently being used in targeted campaigns against cryptocurrency traders, DeFi users, and blockchain developers. The use of Solana for data exfiltration represents a dangerous evolution in malware tradecraft, exploiting the transparency and permanence of public ledgers as a cloak. If you have ever interacted with Solana-based applications, stored crypto in a browser wallet, or saved exchange credentials in your browser, your system is a direct target. Your browser sessions and digital wallets are already being probed by this malware; immediate, specialized inspection of your systems and wallets is required to confirm you have not already been silently compromised.

🛡️ RUN A DIAGNOSTIC SCAN

Before proceeding, we strongly recommend scanning your current network environment and verifying any suspicious URLs you may have interacted with.

>> LAUNCH ZERO-DAY THREAT SCANNER <<

Source Intelligence: Read the full technical breakdown here

Post a Comment

0 Comments