Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Posted on July 3, 2025July 3, 2025 By CWS

Jul 03, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox which can be designed to steal cryptocurrency pockets secrets and techniques, placing customers’ digital belongings in danger.
“These extensions impersonate official pockets instruments from widely-used platforms reminiscent of Coinbase, MetaMask, Belief Pockets, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Pockets, and Filfox,” Koi Safety researcher Yuval Ronen mentioned.
The massive-scale marketing campaign is alleged to have been ongoing since no less than April 2025, with new extensions uploaded to the Firefox Add-ons retailer as lately as final week.

The recognized extensions have been discovered to artificially inflate their reputation, including tons of of 5-star opinions that go far past the full variety of energetic installations. This technique is employed to offer them an phantasm of authenticity, making it look like they’re broadly adopted and tricking unsuspecting customers into putting in them.
One other tactic adopted by the risk actor to bolster belief entails passing off these add-ons as official pockets instruments, utilizing the identical names and logos.
The truth that among the precise extensions have been open-source allowed the attackers to clone their supply code and inject their very own malicious performance to extract pockets keys and seed phrases from focused web sites and exfiltrate them to a distant server. The rogue extensions have additionally been discovered to transmit the victims’ exterior IP addresses.In contrast to typical phishing scams that depend on pretend web sites or emails, these extensions function contained in the person’s browser—making them far tougher to detect or block with conventional endpoint instruments.
“This low-effort, high-impact strategy allowed the actor to take care of anticipated person expertise whereas decreasing the probabilities of rapid detection,” Ronen mentioned.
The presence of Russian language feedback within the supply code in addition to metadata obtained from a PDF file retrieved from the command-and-control (C2) server used for the exercise factors to a Russian-speaking risk actor group.

All of the recognized add-ons except MyMonero Pockets have since been taken down by Mozilla. Final month, the browser maker mentioned it has developed an “early detection system” to detect and block rip-off crypto pockets extensions earlier than they achieve reputation amongst customers and are used to steal customers’ belongings by tricking them into getting into their credentials.
To mitigate the danger posed by such threats, it is suggested to put in extensions solely from verified publishers and vet them to make sure that they do not silently change their habits post-installation.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Assets, Cryptocurrency, Extensions, Firefox, Malicious, Stealing, Target, User, Wallets

Post navigation

Previous Post: The Hidden Weaknesses in AI SOC Tools that No One Talks About
Next Post: Cisco Warns of Hardcoded Credentials in Enterprise Software

Related Posts

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes The Hacker News
WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations The Hacker News
How to Use Ringfencing to Prevent the Weaponization of Trusted Software The Hacker News
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark