CybersecurityFintechNewswireTechnology

150 Crypto-Draining Extensions Found in Firefox Add-On Store

Get Hired 3x Faster with AI- Powered CVs CV Assistant single post Ad
▼ Summary

– A crypto-draining scheme called ‘GreedyBear’ targeted Firefox users via 150 malicious extensions, stealing $1 million by impersonating wallets like MetaMask.
– The extensions initially bypassed Mozilla’s review, then transformed to include malicious code that harvested wallet credentials and IP addresses.
– The campaign is linked to Russian-language pirated software sites distributing 500+ malware variants, including info-stealers and ransomware.
– Attackers used AI-generated code to evade detection and rapidly rebuild operations, with evidence of expansion to Chrome’s Web Store.
– Users should verify extensions, download wallets from official sources, and remain vigilant as attackers refine tactics.

A recent security investigation has uncovered a widespread crypto-draining scheme targeting Firefox users through malicious browser extensions. Dubbed ‘GreedyBear,’ the operation infiltrated Mozilla’s add-on store with 150 fraudulent extensions, siphoning an estimated $1 million from victims by impersonating legitimate cryptocurrency wallets like MetaMask and TronLink.

Security researchers at Koi Security found that these extensions initially appear harmless to bypass Mozilla’s review process. Once approved, they undergo a sinister transformation—developers strip away original branding, replace it with deceptive names and logos, and inject malicious code designed to harvest sensitive data. The malware functions as a keylogger, capturing wallet credentials entered by users and transmitting them to attacker-controlled servers along with victims’ IP addresses.

The campaign doesn’t stop at browser extensions. It’s linked to a network of Russian-language pirated software sites distributing over 500 malware variants, including info-stealers like LummaStealer and ransomware. Fake websites mimicking Trezor and Jupiter Wallet further amplify the threat, all connected to a single command-and-control server (185.208.156.66).

Though Mozilla has removed the reported extensions, the incident highlights how cybercriminals leverage automation to scale attacks rapidly. Analysis of the malicious code reveals AI-generated elements, enabling attackers to evade detection and rebuild operations swiftly after takedowns. This follows another recent Firefox store breach involving 40 counterfeit wallet extensions, despite Mozilla’s 2025 safeguards against crypto-draining add-ons.

Worryingly, evidence suggests the group may be expanding to Chrome’s Web Store. Researchers identified a malicious Chrome extension, “Filecoin Wallet,” using identical data-theft techniques and communicating with the same C2 server.

To stay protected, users should verify extensions by checking publisher details and reading multiple reviews. Always download wallet software directly from official project websites or trusted store listings. While Mozilla and Google have been alerted to the campaign, vigilance remains critical as attackers refine their tactics.

(Source: Bleeping Computer)

Topics

crypto-draining scheme 95% malicious browser extensions 90% firefox security breach 85% greedybear operation 80% fraudulent cryptocurrency wallets 75% malware distribution network 70% ai-generated malicious code 65% chrome web store threat 60% user protection measures 55% mozilla google response 50%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!