Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Posted on July 3, 2025July 3, 2025 By CWS

Jul 03, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox which can be designed to steal cryptocurrency pockets secrets and techniques, placing customers’ digital belongings in danger.
“These extensions impersonate official pockets instruments from widely-used platforms reminiscent of Coinbase, MetaMask, Belief Pockets, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Pockets, and Filfox,” Koi Safety researcher Yuval Ronen mentioned.
The massive-scale marketing campaign is alleged to have been ongoing since no less than April 2025, with new extensions uploaded to the Firefox Add-ons retailer as lately as final week.

The recognized extensions have been discovered to artificially inflate their reputation, including tons of of 5-star opinions that go far past the full variety of energetic installations. This technique is employed to offer them an phantasm of authenticity, making it look like they’re broadly adopted and tricking unsuspecting customers into putting in them.
One other tactic adopted by the risk actor to bolster belief entails passing off these add-ons as official pockets instruments, utilizing the identical names and logos.
The truth that among the precise extensions have been open-source allowed the attackers to clone their supply code and inject their very own malicious performance to extract pockets keys and seed phrases from focused web sites and exfiltrate them to a distant server. The rogue extensions have additionally been discovered to transmit the victims’ exterior IP addresses.In contrast to typical phishing scams that depend on pretend web sites or emails, these extensions function contained in the person’s browser—making them far tougher to detect or block with conventional endpoint instruments.
“This low-effort, high-impact strategy allowed the actor to take care of anticipated person expertise whereas decreasing the probabilities of rapid detection,” Ronen mentioned.
The presence of Russian language feedback within the supply code in addition to metadata obtained from a PDF file retrieved from the command-and-control (C2) server used for the exercise factors to a Russian-speaking risk actor group.

All of the recognized add-ons except MyMonero Pockets have since been taken down by Mozilla. Final month, the browser maker mentioned it has developed an “early detection system” to detect and block rip-off crypto pockets extensions earlier than they achieve reputation amongst customers and are used to steal customers’ belongings by tricking them into getting into their credentials.
To mitigate the danger posed by such threats, it is suggested to put in extensions solely from verified publishers and vet them to make sure that they do not silently change their habits post-installation.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Assets, Cryptocurrency, Extensions, Firefox, Malicious, Stealing, Target, User, Wallets

Post navigation

Previous Post: The Hidden Weaknesses in AI SOC Tools that No One Talks About
Next Post: Cisco Warns of Hardcoded Credentials in Enterprise Software

Related Posts

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs The Hacker News
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data The Hacker News
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs The Hacker News
How to Detect Phishing Attacks Faster: Tycoon2FA Example The Hacker News
AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals The Hacker News
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
  • Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News