The attacked uses the memo field of Solana transactions to run stealth malware that steals crypto wallet data, and even hardware wallet recovery phrases.The attacked uses the memo field of Solana transactions to run stealth malware that steals crypto wallet data, and even hardware wallet recovery phrases.

Solana memo feature exploited to run hidden malware

2026/03/28 01:06
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Hackers are moving away from normal servers and using decentralized systems to attack developers and steal their crypto funds.  They are are replacing traditional command-and-control (C2) servers entirely with decentralized options.

In this attack, the malware abuses the Solana blockchain. It uses the memo field of Solana transactions to run stealth malware that steals crypto wallet data, and even hardware wallet recovery phrases.

The memo field was originally designed for simple transaction notes, but attackers are now using it as a hidden communication layer. This turns a public blockchain feature into a covert channel for malware control.

Decentralized memos like Solana’s are public and permanent and they cannot be taken down by any single party. In addition, attackers can update instructions without changing malware.

The campaign is considered a new version of the GlassWorm malware, which has been active since at least 2022.

Solana memos act as a dead drop resolver

According to security researchers from Aikido, the attack has three stages or three payloads. The first stage/payload is just an entry point. It begins when a developer installs a malicious package from open source repositories like npm, PyPI, GitHub, or the Open VSX marketplaces.

The malware then checks if the system locale is Russian and if so, it does not proceed with the attack. This is because the attackers are likely based in Russia and do not want to get caught by authorities. Once installed, the malware uses the Solana blockchain to fetch the attacker’s command-and-control (C2) server IP address. It looks for a specific transaction on Solana that contains the C2 server’s IP address in the memo field.

The malware then connects to the C2 server and starts the second stage of the attack. In this stage, the malware looks for crypto data like seed phrases, private keys, and even screenshots of wallets. It targets browser extension wallets like MetaMask, Phantom, Coinbase, Exodus, Binance, Ronin, Keplr, and more.

The malware also looks for browser data like login sessions, session tokens, and cloud access. This means it can access centralized exchange accounts, npm, GitHub, and AWS accounts.

After collecting the data, the malware compresses it into a ZIP file, and sends it to the attacker’s server.

Solana memo field abused by hackers to run stealth malware.Source: Aikido Security.

Hardware wallets targeted via phishing

The last payload splits into two parts. The first part is a .NET binary that looks for hardware wallets like Ledger and Trezor. If it finds one, it shows a fake error message that tricks the user into entering their recovery phrase.

The second part is a WebSocket-based JavaScript RAT (remote access trojan) that steals browser data. It also installs a fake Chrome extension that monitors specific sites like exchanges and steals cookies in real time. It’s downloaded through a Google Calendar event as a dead drop resolver. This approach allows the attacker to hide the real server, bypass security filters and it acts as an indirect delivery layer.

Unlike the second stage, where the malware only steals browser data, this RAT has live control. It stays active and monitors the browser. It captures new cookies, tracks active sessions like logged-in exchange accounts, logs keystrokes, and takes screenshots. Moreover, it allows the attacker to run commands on the victim’s machine.

Its difficult to remove GlassWorm. The malware can re-download itself and it can survive reboots. It also uses fallback methods like DHT (Distributed Hash Table) lookups and Solana memos to find the control server.

Since there’s no central server, and the data is shared across many computers, it becomes difficult for defenders to block the attack at the network level.

This attack is very dangerous. It highly severe because it combines crypto theft, full system control, and unremovable network.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Disney Pockets $2.2 Billion For Filming Outside America

Disney Pockets $2.2 Billion For Filming Outside America

The post Disney Pockets $2.2 Billion For Filming Outside America appeared on BitcoinEthereumNews.com. Disney has made $2.2 billion from filming productions like ‘Avengers: Endgame’ in the U.K. ©Marvel Studios 2018 Disney has been handed $2.2 billion by the government of the United Kingdom over the past 15 years in return for filming movies and streaming shows in the country according to analysis of more than 400 company filings Disney is believed to be the biggest single beneficiary of the Audio-Visual Expenditure Credit (AVEC) in the U.K. which gives studios a cash reimbursement of up to 25.5% of the money they spend there. The generous fiscal incentives have attracted all of the major Hollywood studios to the U.K. and the country has reeled in the returns from it. Data from the British Film Institute (BFI) shows that foreign studios contributed around 87% of the $2.2 billion (£1.6 billion) spent on making films in the U.K. last year. It is a 7.6% increase on the sum spent in 2019 and is in stark contrast to the picture in the United States. According to permit issuing office FilmLA, the number of on-location shooting days in Los Angeles fell 35.7% from 2019 to 2024 making it the second-least productive year since 1995 aside from 2020 when it was the height of the pandemic. The outlook hasn’t improved since then with FilmLA’s latest data showing that between April and June this year there was a 6.2% drop in shooting days on the same period a year ago. It followed a 22.4% decline in the first quarter with FilmLA noting that “each drop reflected the impact of global production cutbacks and California’s ongoing loss of work to rival territories.” The one-two punch of the pandemic followed by the 2023 SAG-AFTRA strikes put Hollywood on the ropes just as the U.K. began drafting a plan to improve its fiscal incentives…
Share
BitcoinEthereumNews2025/09/18 07:20
Thai Baht Under Siege: War-Driven Pressures Challenge BOT’s Monetary Stance

Thai Baht Under Siege: War-Driven Pressures Challenge BOT’s Monetary Stance

BitcoinWorld Thai Baht Under Siege: War-Driven Pressures Challenge BOT’s Monetary Stance BANGKOK, March 2025 – The Thai Baht faces unprecedented volatility as
Share
bitcoinworld2026/03/28 06:10
U.S. Dollar Soars: Safe-Haven Surge Propels Greenback to Best Month Since July Amid Iran Conflict

U.S. Dollar Soars: Safe-Haven Surge Propels Greenback to Best Month Since July Amid Iran Conflict

BitcoinWorld U.S. Dollar Soars: Safe-Haven Surge Propels Greenback to Best Month Since July Amid Iran Conflict NEW YORK, March 2025 – The U.S. dollar is rallying
Share
bitcoinworld2026/03/28 06:00