Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users

Posted on July 7, 2025July 7, 2025 By CWS

Safety researchers from the Socket Risk Analysis Crew have uncovered a classy community of eight malicious Firefox browser extensions that actively steal OAuth tokens, passwords, and spy on customers by way of misleading ways.

The invention reveals a coordinated marketing campaign that exploits in style gaming titles and utility functions to compromise person safety throughout the Firefox ecosystem.

Main Gaming Extension Fraud Community Found

The investigation initially started with a single malicious extension known as “Shell Shockers” however rapidly expanded to disclose a whole community of pretend gaming extensions operated by risk actor mre1903.

This cybercriminal, lively since June 2018, has systematically created fraudulent extensions that masquerade as in style video games, together with Little Alchemy 2, 1v1.LOL, Krunker io Recreation, 5 Nights at Freddy’s, and Bubble Spinner.

These malicious extensions exploit person belief by impersonating beloved video games with hundreds of thousands of gamers worldwide.

Nonetheless, as a substitute of offering precise gaming performance, they instantly redirect customers to playing web sites and faux Apple virus alert rip-off pages upon set up.

The risk actor’s method demonstrates a coordinated marketing campaign designed to maximise attain whereas evading detection by way of distributed deployment throughout a number of in style recreation titles.

Past easy redirect scams, researchers recognized a number of extensions using subtle assault strategies. CalSyncMaster, masquerading as a official Google Calendar synchronization software, represents probably the most severe risk within the evaluation.

This extension implements superior OAuth credential theft operations, stealing Google Authentication tokens that present ongoing entry to delicate private and enterprise information.

The malicious code particularly targets Google Calendar APIs, requesting read-only permissions that permit attackers persistent visibility into customers’ assembly schedules, journey plans, enterprise actions, and phone data.

Safety consultants warn that the extension’s structure permits for straightforward scope escalation, doubtlessly enabling occasion manipulation or information deletion by way of easy updates.

The VPN Seize A Proxy Free extension, marketed as a privacy-focused VPN service, secretly tracks customers by injecting invisible monitoring iframes and routing all internet visitors by way of attacker-controlled proxies.

This configuration allows complete surveillance of person actions, together with the potential interception of login credentials, private data, and personal communications.

In the meantime, the GimmeGimme extension targets European purchasing websites like bol.com and coolblue.nl, promising wishlist performance whereas secretly redirecting purchasing classes by way of affiliate monitoring hyperlinks.

Customers unknowingly generate income for attackers whereas being denied the promised options, representing a transparent violation of person belief and transparency.

Rising Browser Extension Risk Panorama

The discoveries spotlight a broader development in cybersecurity threats. Browser extensions have change into more and more favored assault vectors as a consequence of their trusted standing, in depth permissions, and talent to execute inside browsers’ safety contexts.

The development from easy redirect scams to OAuth credential theft demonstrates how rapidly these threats evolve and scale.

Safety consultants advocate that customers often audit put in browser extensions, eradicating any that request permissions exceeding their acknowledged performance.

Organizations ought to implement extension allow-lists in company environments and monitor community visitors for surprising proxy configurations or suspicious exterior communications.

The Socket Risk Analysis Crew emphasizes that these threats require fixed vigilance from each particular person customers and organizations.

The mix of social engineering ways with technical sophistication makes these extensions notably efficient in opposition to unsuspecting customers who belief acquainted recreation names and utility guarantees.

Customers ought to instantly evaluation their put in Firefox extensions and take away any that match the recognized malicious functions to guard their private information and authentication credentials.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Extensions, Firefox, Malicious, OAuth, Passwords, Spy, Steal, Tokens, Users

Post navigation

Previous Post: ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access
Next Post: 10 Best Secure Network As a Service for MSP Providers

Related Posts

Microsoft Patch Tuesday August 2025 Released Cyber Security News
10 Best Virtual Machine (VM) Monitoring Tools in 2025 Cyber Security News
New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data Cyber Security News
Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access Cyber Security News
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark