DeFi Security Alert: Malicious Solana Bot Hijacks Wallets via GitHub Open-Source

Photo of author

By Jason Walker

The rapidly evolving landscape of decentralized finance (DeFi) continues to attract sophisticated cyber threats, with a recent incident highlighting acute vulnerabilities within the open-source software ecosystem. A malicious project on GitHub, masquerading as a Solana trading bot, successfully compromised user wallets, according to a July 2, 2025, report by cybersecurity firm SlowMist. This event underscores the critical need for heightened scrutiny and robust security practices in a sector heavily reliant on community-driven development and open repositories.

Operating under the username zldp2002, the project, named “solana-pumpfun-bot,” quickly gained traction. However, instead of delivering its promised functionality, the bot covertly siphoned cryptocurrency from users’ wallets, redirecting the stolen funds to the FixedFloat platform. This deceptive maneuver bypassed standard security protocols by exploiting trust inherent in open-source contributions.

Deceptive Tactics and Technical Execution

SlowMist’s investigation revealed that the Node.js-based bot employed a suspicious dependency, “crypto-layout-utils,” notably absent from official NPM repositories. Upon installation, this rogue package meticulously scanned the user’s device for private keys and wallet files, subsequently exfiltrating this sensitive data to a hacker-controlled server located at githubshadow.xyz. The attacker further complicated detection by heavily obfuscating the malware’s code and creating multiple forks of the project using fraudulent GitHub accounts to increase its visibility and perceived legitimacy. Some of these variants utilized an alternative malicious package, “bs58-encrypt-utils-1.0.3.”

The attack campaign was identified as active since June 12, 2025. It came to light only after a victim contacted SlowMist the day after installing the deceptive project. Post-exploit on-chain analysis, conducted using SlowMist’s MistTrack tool, conclusively confirmed that the stolen assets were rerouted to FixedFloat, tracing the flow of illicit funds.

Mitigation and Broader Industry Implications

This incident serves as a stark warning regarding the inherent risks of executing open-source software, particularly those interacting with sensitive assets like wallets or private keys, without stringent precautions. SlowMist emphatically advises against running such applications unless within highly isolated environments. The company also strongly recommends avoiding suspicious or unverified packages, especially within the context of crypto bot platforms and automation tools.

The case prominently highlights the escalating threat of social engineering and dependency hijacking within the open-source cryptocurrency software development landscape. As the industry continues to innovate, the imperative for thorough vetting and verification of every component before deployment becomes increasingly critical to safeguard digital assets and maintain ecosystem integrity. This incident reinforces the need for developers and users alike to exercise extreme diligence to mitigate the risks associated with sophisticated cyber campaigns.

Share