news

Solana Users Targeted in Sophisticated GitHub Malware Trap

Nahid
Published: July 5, 2025
3 min read
Solana Users Targeted in Sophisticated GitHub Malware Trap

STAY UPDATED WITH COTI

Follow COTI across social media platforms to get the latest news, updates and community discussions.

Facebook
Instagram
LinkedIn
YouTube

TL;DR

  • A fake GitHub “Solana trading bot” called solana‑pumpfun‑bot contained malware that stole wallet keys from users.
  • Designed in Node.js, it relied on hidden NPM packages (crypto-layout-utils, later bs58-encrypt-utils) not found in official registries.
  • Attackers forked and starred repositories to appear legitimate. SlowMist says the malware quietly scanned files and exfiltrated keys to githubshadow.xyz.
  • The scam, active since mid‑June, highlights growing threats in open-source and software supply chains. Users are urged to vet dependencies carefully.

On July 2, SlowMist , a blockchain security firm, alerted the crypto community to a malicious GitHub project masquerading as a Solana trading bot.

A user had downloaded and ran the repository zldp2002/solana-pumpfun-bot only, and saw their crypto vanish. The project, built with Node.js, appeared legitimate complete with forks, stars, and recent commits. But behind the façade, it concealed danger.

According to SlowMist, the project referenced a dependency called crypto-layout-utils, which had mysteriously been removed from the official NPM registry, a red flag  .

Obfuscated Malware in Plain Sight

Source : SlowMist

Digging deeper, SlowMist found that the package was being sourced from a private GitHub release, not NPM. After de-obfuscating the code, they discovered it would:

  1. Scan local files for wallet-related data or private keys.
  2. Upload any found keys to a remote server under attacker control (githubshadow.xyz)  .

SlowMist also linked the scam to many GitHub accounts, all of which forked the bot to inflate its popularity and mask malicious intent. Further forks used a second malicious module, bs58-encrypt-utils, introduced around June 12 .

Malware in the Real-World Supply Chain

Over the past year, cybercriminals have increasingly weaponized open-source tools and supply-chain systems to inject malware, affecting libraries, browser extensions, and bots that are often trusted by developers and users  .

By mimicking legitimate tools and manipulating project metrics, attackers can fool even experienced developers into running malicious code.

How to Stay Safe

With these attacks getting more sophisticated, here’s how you can protect yourself:

  • Inspect dependencies: If a package has been removed from NPM or is sourced externally, treat it with suspicion.
  • Check project history: An abrupt spike in stars/forks and no long-term activity can signal a trap.
  • Use sandboxed environments: Never run unverified tools on systems that contain sensitive data or live wallets.
  • Run static analysis tools: Basic scanners can flag obfuscated or network-requesting code.
  • Stay informed: Follow security alerts from firms like SlowMist for real-time updates.

Final Thought

The solana-pumpfun-bot scam is a stark reminder that not all open-source code is trustworthy even if it looks popular and active. In the rapidly evolving world of crypto, vigilance matters more than ever. Whether you’re a trader, developer, or node hobbyist, scrutinize every repository and dependency before trusting your private keys. When in doubt, run code in isolation or skip it altogether.

Open-source has immense power but it’s only as safe as the habits of those who use it.

 

About the Project


About the Author

Nahid

Nahid

Based in Bangladesh but far from boxed in, Nahid has been deep in the crypto trenches for over four years. While most around him were still figuring out Web2, he was already writing about Web3, decentralized protocols, and Layer 2s. At CotiNews, Nahid translates bleeding-edge blockchain innovation into stories anyone can understand — proving every day that geography doesn’t define genius.

Disclaimer

The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official stance of CotiNews or the COTI ecosystem. All content published on CotiNews is for informational and educational purposes only and should not be construed as financial, investment, legal, or technological advice. CotiNews is an independent publication and is not affiliated with coti.io, coti.foundation or its team. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. Readers are strongly encouraged to do their own research (DYOR) before making any decisions based on the content provided. For corrections, feedback, or content takedown requests, please reach out to us at

contact@coti.news

Stay Ahead of the Chain

Subscribe to the CotiNews newsletter for weekly updates on COTI V2, ecosystem developments, builder insights, and deep dives into privacy tech and industry.
No spam. Just the alpha straight to your inbox.

We care about the protection of your data. Read our Privacy Policy.