Advanced Malware Threat: GlassWorm Uses Solana Blockchain to Evade Detection


Security researchers have uncovered a new evolution of the GlassWorm malware campaign, introducing a highly sophisticated technique that leverages blockchain technology to hide its command-and-control (C2) infrastructure.

Unlike traditional malware, this variant uses the Solana blockchain as a “dead drop” mechanism to retrieve instructions and payloads, making detection and takedown significantly more difficult.

How the Attack Works

The attack chain is multi-stage and designed for maximum stealth and data exfiltration.

Initial access is typically gained through compromised developer ecosystems, including malicious packages distributed via platforms like npm, PyPI, GitHub, and extension marketplaces.

Once executed, the malware retrieves instructions from data embedded in Solana blockchain transactions, effectively hiding its infrastructure in a decentralized and immutable environment.

From there, it downloads system-specific payloads and begins the infection process.

Multi-Stage Payload and Capabilities

GlassWorm is not a simple malware, it is a full framework designed for deep system compromise.

Key capabilities include:

  • Deployment of a Remote Access Trojan (RAT) for persistent control
  • Installation of a malicious Chrome extension disguised as Google Docs offline
  • Keystroke logging and screenshot capture
  • Theft of cookies, session tokens, and browser data
  • Extraction of cryptocurrency wallet information

All collected data is packaged and exfiltrated to attacker-controlled infrastructure.

hy Blockchain Makes This Dangerous

The use of blockchain introduces a new level of resilience for attackers.

Traditional malware relies on centralized servers that can be blocked or taken down. In contrast, GlassWorm retrieves its instructions from the Solana blockchain, which:

  • Cannot be easily shut down or censored
  • Is publicly accessible yet difficult to monitor effectively
  • Allows attackers to update payload locations dynamically

This approach significantly complicates detection and response efforts for security teams.

Additional Evasion Techniques

The campaign also demonstrates a high level of operational maturity:

  • Avoids infecting systems configured with Russian locale
  • Uses multiple delivery vectors, including supply chain attacks
  • Continuously rotates infrastructure to evade detection

These characteristics indicate a well-resourced and adaptive threat actor.

Mitigation and Security Recommendations

Organizations and developers should take proactive measures to reduce risk:

  • Avoid installing unverified packages or extensions
  • Audit dependencies and monitor for suspicious updates
  • Restrict browser extension permissions
  • Monitor outbound traffic, including unusual blockchain-related requests
  • Implement endpoint detection and response (EDR) solutions

Given its stealth and persistence, early detection is critical.

Why This Matters

GlassWorm represents a shift in how malware operates moving away from traditional infrastructure to decentralized platforms.

This evolution signals a broader trend where attackers increasingly adopt innovative technologies to bypass conventional defenses. As a result, organizations must adapt their security strategies to address these emerging threats.

Resources

Comments

Popular posts from this blog

The Hidden Lag Killing Your SIEM Efficiency

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware