A significant evolution of the GlassWorm campaign has emerged, deploying a sophisticated multi-stage framework that leverages Solana blockchain transactions as "dead drops" for covert command and control1. This advanced threat delivers a remote access trojan (RAT) which subsequently installs a malicious Google Chrome extension, deceptively presented as an offline version of Google Docs. The extension is engineered to harvest extensive sensitive data, including keystrokes, browser cookies, and session tokens, alongside capturing screenshots and exfiltrating cryptocurrency-related information. The comprehensive data theft capabilities highlight a persistent and adaptive adversary. This operation represents a critical shift, moving beyond typical criminal motivations to potentially state-aligned activity, altering the threat landscape from purely financial to geopolitical considerations and demanding a recalibrated defensive posture for organizations.
GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
⚡ High Priority
Why This Matters
State-aligned activity involving Google shifts the threat model from criminal to geopolitical — different playbook required.
References
- The Hacker News. (2026, March 25). GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data. *The Hacker News*. https://thehackernews.com/2026/03/glassworm-malware-uses-solana-dead.html
Original Source
The Hacker News
Read original →