Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Posted on August 4, 2025August 4, 2025 By CWS

Mozilla has issued an pressing safety alert to its developer neighborhood following the detection of a complicated phishing marketing campaign particularly concentrating on AMO (addons.mozilla.org) accounts.

The corporate’s safety workforce, led by Scott DeVaney, reported on August 1, 2025, that cybercriminals are actively trying to compromise developer credentials via misleading emails claiming account updates are required to take care of entry to developer options.

Key Takeaways1. Mozilla detected phishing emails concentrating on add-on builders.2. Pretend emails use incorrect domains (like “mozila”) and fail SPF/DKIM/DMARC checks.3. Solely enter credentials on mozilla.org/firefox.com.

Targets Mozilla Add-on Builders 

The malicious marketing campaign makes use of rigorously crafted emails that masquerade as official Mozilla communications, sometimes containing variations of the message “Your Mozilla Add-ons account requires an replace to proceed accessing developer options”. 

These subtle phishing makes an attempt exploit builders’ considerations about sustaining entry to their publishing privileges on the AMO platform, which serves as the first distribution channel for Firefox extensions and add-ons.

Safety researchers have recognized a number of technical indicators that may assist builders distinguish legit communications from fraudulent ones. 

Genuine Mozilla emails completely originate from verified domains, together with firefox.com, mozilla.org, mozilla.com, and their respective subdomains. 

Moreover, legit emails go important e-mail authentication protocols, together with SPF (Sender Coverage Framework), DKIM (DomainKeys Recognized Mail), and DMARC (Area-based Message Authentication, Reporting, and Conformance) checks.

Proof from affected builders reveals that some phishing emails include apparent technical flaws, together with misspelled domains corresponding to “mozila” as an alternative of “mozilla,” which ought to function quick purple flags for recipients. 

Regardless of these obvious errors, the marketing campaign has efficiently compromised a minimum of one developer account, with one sufferer reporting they “fell for the phishing rip-off” earlier than shortly realizing the deception and deleting their extension.

Mozilla Suggestions

Mozilla’s safety advisory emphasizes a multi-layered strategy to safety, urging builders to implement strict verification procedures when dealing with suspicious communications. 

The corporate recommends that builders by no means click on embedded hyperlinks in emails claiming to be from Mozilla, as an alternative advocating for direct navigation to mozilla.org or firefox.com domains.

Crucial safety protocols embody validating that any hyperlinks inside emails level completely to verified Mozilla domains earlier than interplay, and making certain that Mozilla credentials are solely entered on official mozilla.org or firefox.com web sites. 

The corporate has additionally directed builders to further assets from the U.S. Federal Commerce Fee and the U.Okay. Nationwide Cyber Safety Centre for complete steerage on detecting and reporting phishing scams.

This incident highlights the rising menace panorama dealing with WebExtensions builders and the broader Mozilla ecosystem, as cybercriminals more and more goal developer accounts to distribute malicious code via trusted extension platforms probably.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Account, Addon, Attacks, Developers, Mozilla, Phishing, Targeting, Warns

Post navigation

Previous Post: Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
Next Post: NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Related Posts

Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Cyber Security News
Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games Cyber Security News
Threat Actors Allegedly Claim Access to Nokia’s Internal Network Cyber Security News
Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
  • SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
  • Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
  • NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
  • SonicWall VPNs Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
  • Nvidia Triton Vulnerabilities Pose Big Risk to AI Models
  • NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News