US State Actor Suspected in Targeting Russian Solana Devs With Malware

State-Sponsored “Solana-scan” Malware Targets Russian Crypto Developers with AI-Generated Code

  • Malware known as “Solana-scan” has targeted Russian Solana developers, focusing on crypto credentials and tokens.
  • The attack deploys malicious JavaScript packages on NPM under the username “cryptohan.”
  • Researchers suggest U.S. state-sponsored actors may be responsible, given evidence linking command servers to U.S. IP addresses.
  • Victims are Russian users and may include individuals connected to Ransomware activity.
  • The malware’s code appears to have been partially created using generative AI tools.

Russian developers within the Solana Blockchain community have been targeted by a type of malware called “Solana-scan,” according to research from software supply chain security firm Safety. This infostealer malware gathers sensitive information related to cryptocurrency holdings and may be connected to efforts by U.S. state-sponsored actors.

- Advertisement -

Two packages, “solana-pump-test” and “solana-spl-sdk,” were released through the JavaScript registry NPM by someone using the handle “cryptohan.” These packages claim to scan for Solana SDK components but instead capture users’ crypto credentials and token ownership data. Safety’s Head of Research, Paul McCarty, highlighted that the stolen data is sent to command and control servers with U.S.-based IP addresses.

“Cryptohan” is a widely used nickname in the crypto space, likely chosen to make the packages appear legitimate, McCarty stated. He also emphasized that the malware’s victims are specifically users with Russian IP addresses. This detail, combined with the destination of stolen data, led McCarty to suggest the involvement of a “state-sponsored actor.”

According to coverage in The Register, these attacks may be aimed at individuals connected to Russian ransomware gangs. Such groups have previously targeted U.S. infrastructure and demanded cryptocurrency payments, as noted in statements from U.S. government sources, including a press release from the Department of the Treasury.

A unique aspect of the “Solana-scan” malware, according to McCarty, is that parts of its coding show signs of being developed with generative Artificial Intelligence tools. He explained that the JavaScript payload fits patterns associated with large language models such as Claude.

- Advertisement -

The research suggests an advanced malware campaign using both technical deception (fake package names) and modern coding techniques to reach its targets. The overall aim appears to be the theft of crypto credentials, with evidence pointing to an ongoing digital conflict between U.S. and Russian actors involving the broader blockchain and cryptocurrency sectors.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...

Tesla surges 89% in Norway; France, Sweden plunge 66/71% Dec

Tesla registrations in Norway jumped 89% in December to 5,679 vehicles.Tesla finished 2025 as...

KRX Readies for Crypto ETFs as SK Regulators Weigh Approval.

Korea Exchange says it is ready to list and trade new products such as...
- Advertisement -

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...
Bitcoin (BTC) $ 89,502.00 1.83%
Ethereum (ETH) $ 3,081.23 3.18%
XRP (XRP) $ 1.92 3.42%
Bittensor (TAO) $ 240.79 7.19%
Polkadot (DOT) $ 2.02 6.94%
Cardano (ADA) $ 0.372039 7.38%
Chainlink (LINK) $ 13.12 6.10%
Hyperliquid (HYPE) $ 24.58 0.31%
Monero (XMR) $ 418.93 0.72%
Hedera (HBAR) $ 0.119809 9.02%
Toncoin (TON) $ 1.74 3.19%