MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Chrome Exploit CVE-2025-10585 Could Drain Your Crypto: How to Stay Protected
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$78,272.002.33%
  • ethereumEthereum(ETH)$2,295.771.49%
  • tetherTether(USDT)$1.000.03%
  • rippleXRP(XRP)$1.391.27%
  • binancecoinBNB(BNB)$615.23-0.17%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$83.590.43%
  • tronTRON(TRX)$0.326699-0.09%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.040.33%
  • dogecoinDogecoin(DOGE)$0.1087561.83%
NFTs

Chrome Exploit CVE-2025-10585 Could Drain Your Crypto: How to Stay Protected

Last updated: October 10, 2025 4:30 am
Published: 7 months ago
Share

* Update Chromium-based browsers to the patched Chrome/Edge/Opera builds and relaunch them. A non-updated browser stays vulnerable.

* The fastest path to a “drain” is you signing bad approvals. Treat surprise wallet prompts and infinite spend requests as hostile by default.

* Segregate crypto activity into a clean browser profile and pair it with a hardware wallet for any non-trivial funds.

* Shrink your blast radius: regularly revoke stale approvals, enable passkeys/2FA, and use withdrawal allowlists on exchanges.

A new Chrome zero-day (CVE-2025-10585) is being exploited right now. It lives in V8, Chrome’s JavaScript engine. Visit the wrong page, and an attacker could run code through your browser.

If you trade or store crypto through a browser wallet, you should treat this issue as an urgent concern.

On September 17, 2025, Google pushed a fix to the Stable branch of Chrome.

Update first. Read the rest of the post next!

CVE-2025-10585 Vulnerability Explained: A New Zero-Day Exploit in Chrome

It’s a type-confusion bug in V8, meaning that Chrome can mis-handle objects in your browser’s memory and accidentally open the door to code execution. Google says it’s being used in the wild, which is why the fix shipped fast.

If you’re a crypto wallet user, here’s why you should care.

Most wallets, such as MetaMask, Rabby, and Phantom, are primarily used as Chrome extensions. If this exploit executes in your browser, attackers can interact with your wallet user interface, and that’s where the problem lies.

Can Chrome Exploit CVE-2025-10585 Actually Drain your Crypto?

Your cryptocurrencies aren’t stored in your browser; they’re stored on-chain. However, a working browser exploit lowers the drawbridge, compromising the wallet interface or session and making it much easier for attackers to trick you into signing transactions.

Here’s what attackers can prompt:

* Fake wallet prompts: These prompts display overlays that mimic MetaMask, Rabby, or other wallet confirmations and ask you to “reconnect” or “claim” assets, among other prompts. What you’re really doing if you click these is signing a transaction approval, irreversibly moving your money to another wallet.

* Spend approvals: Some exploits may not take your crypto right away. Instead, it may request a spend approval, a signature that enables the entity’s smart contract to transfer your tokens whenever it wants.

* Session hijack: If the browser exploit steals session cookies from your exchange or web wallet, it can pretend to be you until you’re finished with the session. Essentially, if you’re logged into an exchange while the exploit is active, it can take over, moving your assets as it sees fit.

* Clipboard/keystroke abuse: Some exploits can take advantage of your clipboard to steal your password.

All this to say, your web browser is simply step one in many crypto theft methods. This zero-day exploit makes that step easier.

NFTs have an equally risky shortcut:

* The command: setApprovalForAll provides an exploit operator with permission to move every token in a collection. This command is great for legitimate marketplaces, but terrible for someone trying to drain your wallet.

* If a pop-up asks for unlimited approvals or approval-for-all while you’re trying to connect to a Web3 service, it’s trying to activate this command, which is a red flag.

Attackers also use a method called address poisoning, which litters your history with look-alike addresses, so if you’re sending assets to a commonly used address, you paste the wrong one. Use an address book, not your recent activity, to copy destinations.

Finally, remember the session-hijack angle: if the exploit nabs cookies from a web wallet or exchange, an attacker can act as you until the session dies — another reason to enable passkeys/2FA and withdrawal allowlists in addition to patching Chrome.

How to Check If You’re Patched or Not?

If you use Chrome, Edge, Opera, or other Chromium-based browsers, check the following to see if you’re patched:

* Chrome Stable: Fixed in 140.0.7339.185/.186 for Windows/Mac and 140.0.7339.185 for Linux. Check your release by going to Menu > Help > About Google Chrome.

* Microsoft Edge: Fixed in version 140 of Edge’s Stable Channel.

* Opera: Opera explicitly lists patched builds:

If your browser versions are under any of these listed numbers, you’re out of date.

How to Protect Your Crypto From Browser Exploits

Your crypto is only as secure as the habits and tools you use to protect it. Follow these steps to minimize risks and keep your assets safe from common attack vectors:

* Update and relaunch: Don’t assume your browser’s auto-update ran. Verify that your browser matches the patched builds.

* Clean your extensions: Keep your wallet and a reputable ad blocker, clean out and reinstall any necessary extensions. If you don’t want to uninstall your extensions, at least force updates via chrome://extensions → Developer mode → Update.

* Split your browsing: Use a dedicated browser or profile for crypto. Fewer tabs and plugins mean fewer hooks for exploits to latch on.

* Use a hardware wallet: Hardware wallets place a physical barrier on moving your assets. This barrier is crucial if an exploit tries to spoof a virtual wallet interface.

* Revoke old approvals: Old token permissions increase your potential of getting taken advantage of. Revoke ones that you haven’t used in a while.

* Secure your accounts: Turn on app passkeys, generate strong passwords using a password manager, activate two-factor authentication (2FA), and use withdrawal allowlists where supported.

* Slow down on transaction signing: Be very careful with transaction prompts. Fully examine each one before signing, and read names + transaction amounts before you approve anything.

Conclusion

CVE-2025-10585 doesn’t magically empty your wallet. It makes tricking you much easier by compromising the very screens that you trust.

Patch your browsers now, keep your online experience lean, separate your crypto activity, and use a hardware wallet for maximum security.

Read more on CCN – Capital & Celeb News

This news is powered by CCN – Capital & Celeb News CCN - Capital & Celeb News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Top 6 Best Crypto Presales to Buy After the Market Crash, AlphaPepe Leads the Recovery Rally
Not Satoshi? Ripple CTO Ends Speculations Around His XRP Wallet
BBC Group and YouTube announce new strategic partnership to deliver more for audiences and support Creators across the UK
WISeKey to ConnectWISeRobot.CH to the WISeSat.Space Constellation protected by SEALSQ Post-Quantum Cryptography; | Taiwan News | Feb. 3, 2026 14:00
Top 5 Cryptos To Buy This Month as BlockchainFX App Launch Nears

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article BNB Meme Coins Crash Up to 95% After CZ Dismisses ‘Endorsement’ Claims
Next Article HHCN organises ‘The Inhibitors Colloquium 2025’ on Haemophilia in New Delhi
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d