Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Posted on July 3, 2025July 3, 2025 By CWS

Jul 03, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox which can be designed to steal cryptocurrency pockets secrets and techniques, placing customers’ digital belongings in danger.
“These extensions impersonate official pockets instruments from widely-used platforms reminiscent of Coinbase, MetaMask, Belief Pockets, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Pockets, and Filfox,” Koi Safety researcher Yuval Ronen mentioned.
The massive-scale marketing campaign is alleged to have been ongoing since no less than April 2025, with new extensions uploaded to the Firefox Add-ons retailer as lately as final week.

The recognized extensions have been discovered to artificially inflate their reputation, including tons of of 5-star opinions that go far past the full variety of energetic installations. This technique is employed to offer them an phantasm of authenticity, making it look like they’re broadly adopted and tricking unsuspecting customers into putting in them.
One other tactic adopted by the risk actor to bolster belief entails passing off these add-ons as official pockets instruments, utilizing the identical names and logos.
The truth that among the precise extensions have been open-source allowed the attackers to clone their supply code and inject their very own malicious performance to extract pockets keys and seed phrases from focused web sites and exfiltrate them to a distant server. The rogue extensions have additionally been discovered to transmit the victims’ exterior IP addresses.In contrast to typical phishing scams that depend on pretend web sites or emails, these extensions function contained in the person’s browser—making them far tougher to detect or block with conventional endpoint instruments.
“This low-effort, high-impact strategy allowed the actor to take care of anticipated person expertise whereas decreasing the probabilities of rapid detection,” Ronen mentioned.
The presence of Russian language feedback within the supply code in addition to metadata obtained from a PDF file retrieved from the command-and-control (C2) server used for the exercise factors to a Russian-speaking risk actor group.

All of the recognized add-ons except MyMonero Pockets have since been taken down by Mozilla. Final month, the browser maker mentioned it has developed an “early detection system” to detect and block rip-off crypto pockets extensions earlier than they achieve reputation amongst customers and are used to steal customers’ belongings by tricking them into getting into their credentials.
To mitigate the danger posed by such threats, it is suggested to put in extensions solely from verified publishers and vet them to make sure that they do not silently change their habits post-installation.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Assets, Cryptocurrency, Extensions, Firefox, Malicious, Stealing, Target, User, Wallets

Post navigation

Previous Post: The Hidden Weaknesses in AI SOC Tools that No One Talks About
Next Post: Cisco Warns of Hardcoded Credentials in Enterprise Software

Related Posts

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News