Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users

Posted on July 7, 2025July 7, 2025 By CWS

Safety researchers from the Socket Risk Analysis Crew have uncovered a classy community of eight malicious Firefox browser extensions that actively steal OAuth tokens, passwords, and spy on customers by way of misleading ways.

The invention reveals a coordinated marketing campaign that exploits in style gaming titles and utility functions to compromise person safety throughout the Firefox ecosystem.

Main Gaming Extension Fraud Community Found

The investigation initially started with a single malicious extension known as “Shell Shockers” however rapidly expanded to disclose a whole community of pretend gaming extensions operated by risk actor mre1903.

This cybercriminal, lively since June 2018, has systematically created fraudulent extensions that masquerade as in style video games, together with Little Alchemy 2, 1v1.LOL, Krunker io Recreation, 5 Nights at Freddy’s, and Bubble Spinner.

These malicious extensions exploit person belief by impersonating beloved video games with hundreds of thousands of gamers worldwide.

Nonetheless, as a substitute of offering precise gaming performance, they instantly redirect customers to playing web sites and faux Apple virus alert rip-off pages upon set up.

The risk actor’s method demonstrates a coordinated marketing campaign designed to maximise attain whereas evading detection by way of distributed deployment throughout a number of in style recreation titles.

Past easy redirect scams, researchers recognized a number of extensions using subtle assault strategies. CalSyncMaster, masquerading as a official Google Calendar synchronization software, represents probably the most severe risk within the evaluation.

This extension implements superior OAuth credential theft operations, stealing Google Authentication tokens that present ongoing entry to delicate private and enterprise information.

The malicious code particularly targets Google Calendar APIs, requesting read-only permissions that permit attackers persistent visibility into customers’ assembly schedules, journey plans, enterprise actions, and phone data.

Safety consultants warn that the extension’s structure permits for straightforward scope escalation, doubtlessly enabling occasion manipulation or information deletion by way of easy updates.

The VPN Seize A Proxy Free extension, marketed as a privacy-focused VPN service, secretly tracks customers by injecting invisible monitoring iframes and routing all internet visitors by way of attacker-controlled proxies.

This configuration allows complete surveillance of person actions, together with the potential interception of login credentials, private data, and personal communications.

In the meantime, the GimmeGimme extension targets European purchasing websites like bol.com and coolblue.nl, promising wishlist performance whereas secretly redirecting purchasing classes by way of affiliate monitoring hyperlinks.

Customers unknowingly generate income for attackers whereas being denied the promised options, representing a transparent violation of person belief and transparency.

Rising Browser Extension Risk Panorama

The discoveries spotlight a broader development in cybersecurity threats. Browser extensions have change into more and more favored assault vectors as a consequence of their trusted standing, in depth permissions, and talent to execute inside browsers’ safety contexts.

The development from easy redirect scams to OAuth credential theft demonstrates how rapidly these threats evolve and scale.

Safety consultants advocate that customers often audit put in browser extensions, eradicating any that request permissions exceeding their acknowledged performance.

Organizations ought to implement extension allow-lists in company environments and monitor community visitors for surprising proxy configurations or suspicious exterior communications.

The Socket Risk Analysis Crew emphasizes that these threats require fixed vigilance from each particular person customers and organizations.

The mix of social engineering ways with technical sophistication makes these extensions notably efficient in opposition to unsuspecting customers who belief acquainted recreation names and utility guarantees.

Customers ought to instantly evaluation their put in Firefox extensions and take away any that match the recognized malicious functions to guard their private information and authentication credentials.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Extensions, Firefox, Malicious, OAuth, Passwords, Spy, Steal, Tokens, Users

Post navigation

Previous Post: ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access
Next Post: 10 Best Secure Network As a Service for MSP Providers

Related Posts

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
ConnectWise to Rotate Code Signing Certificates for ScreenConnect, Automate and RMM Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News
New Linux EDR Evasion Tool Using io_uring Kernel Feature Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack
  • New Linux EDR Evasion Tool Using io_uring Kernel Feature
  • 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
  • Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack
  • New Linux EDR Evasion Tool Using io_uring Kernel Feature
  • 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
  • Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News