<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Browser Extension Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/browser-extension/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/browser-extension/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 20 Aug 2024 08:33:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Browser Extension Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/browser-extension/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Jupiter Discovers Malicious Browser Extension Targeting Solana Users</title>
		<link>https://coinengineer.net/blog/jupiter-discovers-malicious-browser-extension/</link>
					<comments>https://coinengineer.net/blog/jupiter-discovers-malicious-browser-extension/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Tue, 20 Aug 2024 11:00:23 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[Genel]]></category>
		<category><![CDATA[Browser Extension]]></category>
		<category><![CDATA[jupiter]]></category>
		<category><![CDATA[Plugin]]></category>
		<category><![CDATA[solana]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=27148</guid>

					<description><![CDATA[<p>Bypassing security cameras, Decentralized Exchange aggregator Jupiter has discovered a new malicious browser plugin called &#8220;Bull Checker,&#8221; which has already empty the wallets of many Solana users. Jupiter creator Meow reported in an Aug. 20 research article that Reddit was advertising the &#8220;Bull Checker&#8221; plugin, accessible on Google Chrome, as a tool to examine all</p>
<p>The post <a href="https://coinengineer.net/blog/jupiter-discovers-malicious-browser-extension/">Jupiter Discovers Malicious Browser Extension Targeting Solana Users</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bypassing security cameras, Decentralized Exchange aggregator <strong>Jupiter</strong> has discovered a new malicious browser plugin called &#8220;<em>Bull Checker</em>,&#8221; which has already empty the wallets of many Solana users.</p>
<p><strong>Jupiter</strong> creator <strong>Meow</strong> reported in an Aug. 20 research article that Reddit was advertising the &#8220;Bull Checker&#8221; <strong>plugin</strong>, accessible on Google Chrome, as a tool to examine all holders of certain memcoeins. Actually, however, it was meant to employ transaction modification to pilfers money from users&#8217; wallets.</p>
<p><strong>Jupiter</strong> said in an Aug. 19 message on X, &#8220;if you have this extension (or similar extensions with extensive permissions you cannot trust), please remove it immediately.&#8221;</p>
<h3>Stealthy Attack Techniques and Community Warning</h3>
<p>While users are interacting with approved distributed apps (DApps) on official domains, the Bull Checker addon might pass Solana simulated tests and show normal appearance. Once a transaction started, the extension changed it to fraudulently transfer tokens to another wallet while still showing the user a regular simulated outcome.</p>
<p><strong>Meow</strong> clarified that the requested &#8220;read and write&#8221; data access for the extension should have raised concerns as actual wallet-checking extensions usually need &#8220;read-only&#8221; rights. Several consumers sadly installed and utilized the plugin, which resulted in financial theft.</p>
<p><strong>Jupiter</strong> underlined that throughout their analysis the main Solana DApps or wallets showed no weaknesses. But this finding follows previous major security lapses in the Solana ecosystem, including a $1 million Cypher Protocol hack earlier this month.</p>
<p>To prevent being victim to these attacks, users are advised to use vigilance and confirm the validity of browser extensions, particularly those claiming significant rights.</p>
<p><i><span style="font-weight: 400;">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our </span></i><a href="https://t.me/coinengineernews"><i><span style="font-weight: 400;">Telegram, </span></i></a><a href="https://www.youtube.com/@CoinEngineer"><i><span style="font-weight: 400;">YouTube</span></i></a><i><span style="font-weight: 400;">, and </span></i><a href="https://twitter.com/coinengineers"><i><span style="font-weight: 400;">Twitter</span></i></a><i><span style="font-weight: 400;"> channels for the latest </span></i><a href="https://coinengineer.io/news/"><i><span style="font-weight: 400;">news</span></i></a><i><span style="font-weight: 400;"> and updates.</span></i></p>
<p>The post <a href="https://coinengineer.net/blog/jupiter-discovers-malicious-browser-extension/">Jupiter Discovers Malicious Browser Extension Targeting Solana Users</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/jupiter-discovers-malicious-browser-extension/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
