Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    GlassWorm Malware Makes use of Solana Lifeless Drops to Ship RAT and Steal Browser, Crypto Knowledge

    March 25, 2026

    Amazon Large Spring Sale 2026 Dwell Offers Tracker

    March 25, 2026

    5 Sensible Strategies to Detect and Mitigate LLM Hallucinations Past Immediate Engineering

    March 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»GlassWorm Malware Makes use of Solana Lifeless Drops to Ship RAT and Steal Browser, Crypto Knowledge
    AI Ethics & Regulation

    GlassWorm Malware Makes use of Solana Lifeless Drops to Ship RAT and Steal Browser, Crypto Knowledge

    Declan MurphyBy Declan MurphyMarch 25, 2026No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    GlassWorm Malware Makes use of Solana Lifeless Drops to Ship RAT and Steal Browser, Crypto Knowledge
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananMar 25, 2026Browser Safety / Menace Intelligence

    Cybersecurity researchers have flagged a brand new evolution of the GlassWorm marketing campaign that delivers a multi-stage framework able to complete information theft and putting in a distant entry trojan (RAT), which deploys an information-stealing Google Chrome extension masquerading as an offline model of Google Docs.

    “It logs keystrokes, dumps cookies and session tokens, captures screenshots, and takes instructions from a C2 server hidden in a Solana blockchain memo,” Aikido safety researcher Ilyas Makari mentioned in a report revealed final week.

    GlassWorm is the moniker assigned to a persistent marketing campaign that obtains an preliminary foothold via rogue packages revealed throughout npm, PyPI, GitHub, and the Open VSX market. As well as, the operators are recognized to compromise the accounts of mission maintainers to push poisoned updates.

    The assaults are cautious sufficient to keep away from infecting methods with a Russian locale and use Solana transactions as a lifeless drop resolver to fetch the command-and-control (C2) server (“45.32.150[.]251”) and obtain working system-specific payloads.

    The stage two payload is a data-theft framework with credential harvesting, cryptocurrency pockets exfiltration, and system profiling capabilities. The collected information is compressed right into a ZIP archive and exfiltrated to an exterior server (“217.69.3[.]152/wall”). It additionally incorporates performance to retrieve and launch the ultimate payload.

    As soon as the info is transmitted, the assault chain entails fetching two extra elements: a .NET binary that’s designed to hold out {hardware} pockets phishing and a Websocket-based JavaScript RAT to siphon internet browser information and run arbitrary code. The RAT payload is fetched from “45.32.150[.]251” by utilizing a public Google Calendar occasion URL as a lifeless drop resolver.

    The .NET binary leverages the Home windows Administration Instrumentation (WMI) infrastructure to detect USB machine connections and shows a phishing window when a Ledger or Trezor {hardware} pockets is plugged in.

    “The Ledger UI shows a pretend configuration error and presents 24 numbered restoration phrase enter fields,” Makari famous. “The Trezor UI shows a pretend “Firmware validation failed, initiating emergency reboot” message with the identical 24-word enter structure. Each home windows embody a ‘RESTORE WALLET’ button.”

    The malware not solely kills any actual Ledger Dwell processes operating on the Home windows host, but in addition re-displays the phishing window if the sufferer closes it. The top purpose of the assault is to seize the pockets restoration phrase and transmit it to the IP handle “45.150.34[.]158.”

    The RAT, alternatively, makes use of a Distributed Hash Desk (DHT) to retrieve the C2 particulars. Within the occasion the mechanism returns no worth, the malware switches to the Solana-based lifeless drop. The RAT then establishes communication with the server to run numerous instructions on the compromised system –

    • start_hvnc / stop_hvnc, to deploy a Hidden Digital Community Computing (HVNC) module for distant desktop entry.
    • start_socks / stop_socks, to launch a WebRTC module and run it as a SOCKS proxy.
    • reget_log, to steal information from internet browsers, similar to Google Chrome, Microsoft Edge, Courageous, Opera, Opera GX, Vivaldi, and Mozilla Firefox. The element is supplied to bypass Chrome’s app-bound encryption (ABE) protections.
    • get_system_info, to ship system data.
    • command, to execute attacker-supplied JavaScript by way of eval().

    The RAT additionally force-installs a Google Chrome extension named Google Docs Offline on Home windows and macOS methods, which then connects to a C2 server and receives instructions issued by the operator, permitting to assemble cookies, localStorage, the complete Doc Object Mannequin (DOM) tree of the energetic tab, bookmarks, screenshots, keystrokes, clipboard content material, as much as 5,000 browser historical past entries, and the put in extensions listing.

    “The extension additionally performs focused session surveillance. It pulls monitored web site guidelines from /api/get-url-for-watch and ships with Bybit (.bybit.com) pre-configured as a goal, awaiting the secure-token and deviceid cookies,” Aikido mentioned. “On detection, it fires an auth-detected webhook to /api/webhook/auth-detected containing the cookie materials and web page metadata. The C2 can even provide redirect guidelines that drive energetic tabs to attacker-controlled URLs.”

    The invention coincides with yet one more shift in GlassWorm techniques, with the attackers publishing npm packages impersonating the WaterCrawl Mannequin Context Protocol (MCP) server (“@iflow-mcp/watercrawl-watercrawl-mcp) to distribute malicious payloads.

    “That is GlassWorm’s first confirmed transfer into the MCP ecosystem,” Koi safety researcher Lotan Sery mentioned. “And given how briskly AI-assisted growth is rising – and the way a lot belief MCP servers are given by design – this may not be the final.”

    Builders are suggested to train warning relating to putting in Open VSX extensions, npm packages, and MCP servers. It is also really useful to confirm writer names, package deal histories, and keep away from blindly trusting obtain counts. Polish cybersecurity firm AFINE has revealed an open-source Python software known as glassworm-hunter to scan developer methods for payloads related to the marketing campaign.

    “Glassworm-hunter makes zero community requests throughout scanning,” researchers Paweł Woyke and Sławomir Zakrzewski mentioned. “No telemetry. No phone-home. No automated replace checks. It reads native information solely. Glassworm-hunter replace is the one command that touches the community. It fetches the most recent IoC database from our GitHub and saves it regionally.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    New Research Reveals How Infostealer Infections Result in Darkish Internet Publicity in Simply 48 Hours

    March 25, 2026

    DDoS-Angriffe haben sich verdoppelt | CSO On-line

    March 25, 2026

    Huntress Brings ITDR to Google Workspace as Id Assaults Surge

    March 24, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    GlassWorm Malware Makes use of Solana Lifeless Drops to Ship RAT and Steal Browser, Crypto Knowledge

    By Declan MurphyMarch 25, 2026

    Ravie LakshmananMar 25, 2026Browser Safety / Menace Intelligence Cybersecurity researchers have flagged a brand new…

    Amazon Large Spring Sale 2026 Dwell Offers Tracker

    March 25, 2026

    5 Sensible Strategies to Detect and Mitigate LLM Hallucinations Past Immediate Engineering

    March 25, 2026

    Wristband permits wearers to regulate a robotic hand with their very own actions | MIT Information

    March 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.