![]() |
<div id="post_message_807958">
A malicious campaign dubbed 'GreedyBear' has snuck onto the Mozilla add-ons store, targeting Firefox users with 150 malicious extensions and stealing an estimated $1,000,000 from unsuspecting victims.<br/> <br/> The campaign, discovered and documented by Koi Security, impersonates cryptocurrency wallet extensions from well-known platforms such as MetaMask, TronLink, and Rabby.<br/> <br/> These extensions are uploaded in a benign form initially, to be accepted by Firefox, and accumulate fake positive reviews.<br/> <br/> At a later phase, the publishers strip out the original branding and replace it with new names and logos while also injecting malicious code to steal users' wallet credentials and IP addresses.<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/images/news/u/1220909/2025/August/add-on.jpg"/><br/> <div style="margin:20px; margin-top:5px; "> <!-- <div class="smallfont" style="margin-bottom:2px">Quote:</div> --> <table border="0" cellpadding="6" cellspacing="0" width="100%"> <tr> <td class="alt2" style="background: rgb(37, 37, 37) none repeat scroll 0% 0%; border: 1px solid rgb(0, 0, 0); border-radius: 5px; font-size: 11px; text-shadow: none;"> Add-on before it turns malicious. Source: Koi Security </td> </tr> </table> </div>The malicious code acts as a keylogger, capturing input from form fields or within displayed popups, which are then sent to the attacker's server.<br/> <br/> "The weaponized extensions captures wallet credentials directly from user input fields within the extension’s own popup interface, and exfiltrate them to a remote server controlled by the group," <a href="https://medium.com/@tuval_49118/3e8628831a05" target="_blank">explains Koi Security's Tuval Admoni</a>.<br/> <br/> "During initialization, they also transmit the victim’s external IP address, likely for tracking or targeting purposes."<br/> <br/> The crypto-draining operation is complemented by dozens of Russian-speaking pirated software websites that facilitate the distribution of 500 distinct malware executables, and also a network of websites impersonating Trezor, Jupiter Wallet, and fake wallet repair services.<br/> <br/> In the cases of malware, the payloads include generic trojans, info-stealers (LummaStealer), or even ransomware.<br/> <br/> All of these sites are linked to the same IP address, 185.208.156.66, which serves as a command-and-control (C2) hub for the GreedyBear operation<br/> <br/> <img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/images/news/u/1220909/2025/August/jupiter.jpg"/><br/> <div style="margin:20px; margin-top:5px; "> <!-- <div class="smallfont" style="margin-bottom:2px">Quote:</div> --> <table border="0" cellpadding="6" cellspacing="0" width="100%"> <tr> <td class="alt2" style="background: rgb(37, 37, 37) none repeat scroll 0% 0%; border: 1px solid rgb(0, 0, 0); border-radius: 5px; font-size: 11px; text-shadow: none;"> Fake Jupiter Wallet site. Source: Koi Security </td> </tr> </table> </div>Koi Security reported its findings to Mozilla, and the offending extensions have been removed from Firefox's add-ons store.<br/> <br/> However, its wide scale and apparent ease in execution are a demonstration of how AI can help cybercriminals create large-scale schemes and quickly recover from total takedowns.<br/> <br/> "Our analysis of the campaign's code shows clear signs of AI-generated artifacts," explains the report.<br/> <br/> "This makes it faster and easier than ever for attackers to scale operations, diversify payloads, and evade detection."<br/> <br/> The previous large-scale attack on the Firefox store <a href="https://www.bleepingcomputer.com/news/security/dozens-of-fake-wallet-add-ons-flood-firefox-store-to-drain-crypto/" target="_blank">occurred last month</a>, involving over 40 fake extensions pretending to be wallets from Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, and MyMonero.<br/> <br/> It's notable that these fraudulent extensions still find their way into the Firefox store despite Mozilla having <a href="https://www.bleepingcomputer.com/news/security/mozilla-launches-new-system-to-detect-firefox-crypto-drainer-add-ons/" target="_blank">deployed a system</a> in June 2025 to detect crypto-drainer add-ons.<br/> <br/> Koi Security also reports seeing signs that the operators of GreedyBear are exploring expansion to the Chrome Web Store, as they already spotted a malicious Chrome extension named "Filecoin Wallet" that uses the same data-theft logic and communicates with the same IP address.<br/> <br/> To minimize the risk from these threats, always read multiple user reviews and check extension and publisher details before installing add-ons on your browser.<br/> <br/> You can find the official wallet extensions on the websites of the projects themselves, either hosted directly or linking to the legitimate add-on on online stores.<br/> <br/> BleepingComputer contacted Mozilla and Google about this campaign and their efforts to protect users, and will update this article with any responses.<br/> <br/> <a href="https://www.bleepingcomputer.com/news/security/wave-of-150-crypto-draining-extensions-hits-firefox-add-on-store" target="_blank">@ BleepingComputer </a> </div> |
All times are GMT. The time now is 07:40 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.