Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users

Posted on July 7, 2025July 7, 2025 By CWS

Safety researchers from the Socket Risk Analysis Crew have uncovered a classy community of eight malicious Firefox browser extensions that actively steal OAuth tokens, passwords, and spy on customers by way of misleading ways.

The invention reveals a coordinated marketing campaign that exploits in style gaming titles and utility functions to compromise person safety throughout the Firefox ecosystem.

Main Gaming Extension Fraud Community Found

The investigation initially started with a single malicious extension known as “Shell Shockers” however rapidly expanded to disclose a whole community of pretend gaming extensions operated by risk actor mre1903.

This cybercriminal, lively since June 2018, has systematically created fraudulent extensions that masquerade as in style video games, together with Little Alchemy 2, 1v1.LOL, Krunker io Recreation, 5 Nights at Freddy’s, and Bubble Spinner.

These malicious extensions exploit person belief by impersonating beloved video games with hundreds of thousands of gamers worldwide.

Nonetheless, as a substitute of offering precise gaming performance, they instantly redirect customers to playing web sites and faux Apple virus alert rip-off pages upon set up.

The risk actor’s method demonstrates a coordinated marketing campaign designed to maximise attain whereas evading detection by way of distributed deployment throughout a number of in style recreation titles.

Past easy redirect scams, researchers recognized a number of extensions using subtle assault strategies. CalSyncMaster, masquerading as a official Google Calendar synchronization software, represents probably the most severe risk within the evaluation.

This extension implements superior OAuth credential theft operations, stealing Google Authentication tokens that present ongoing entry to delicate private and enterprise information.

The malicious code particularly targets Google Calendar APIs, requesting read-only permissions that permit attackers persistent visibility into customers’ assembly schedules, journey plans, enterprise actions, and phone data.

Safety consultants warn that the extension’s structure permits for straightforward scope escalation, doubtlessly enabling occasion manipulation or information deletion by way of easy updates.

The VPN Seize A Proxy Free extension, marketed as a privacy-focused VPN service, secretly tracks customers by injecting invisible monitoring iframes and routing all internet visitors by way of attacker-controlled proxies.

This configuration allows complete surveillance of person actions, together with the potential interception of login credentials, private data, and personal communications.

In the meantime, the GimmeGimme extension targets European purchasing websites like bol.com and coolblue.nl, promising wishlist performance whereas secretly redirecting purchasing classes by way of affiliate monitoring hyperlinks.

Customers unknowingly generate income for attackers whereas being denied the promised options, representing a transparent violation of person belief and transparency.

Rising Browser Extension Risk Panorama

The discoveries spotlight a broader development in cybersecurity threats. Browser extensions have change into more and more favored assault vectors as a consequence of their trusted standing, in depth permissions, and talent to execute inside browsers’ safety contexts.

The development from easy redirect scams to OAuth credential theft demonstrates how rapidly these threats evolve and scale.

Safety consultants advocate that customers often audit put in browser extensions, eradicating any that request permissions exceeding their acknowledged performance.

Organizations ought to implement extension allow-lists in company environments and monitor community visitors for surprising proxy configurations or suspicious exterior communications.

The Socket Risk Analysis Crew emphasizes that these threats require fixed vigilance from each particular person customers and organizations.

The mix of social engineering ways with technical sophistication makes these extensions notably efficient in opposition to unsuspecting customers who belief acquainted recreation names and utility guarantees.

Customers ought to instantly evaluation their put in Firefox extensions and take away any that match the recognized malicious functions to guard their private information and authentication credentials.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:Extensions, Firefox, Malicious, OAuth, Passwords, Spy, Steal, Tokens, Users

Post navigation

Previous Post: ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access
Next Post: 10 Best Secure Network As a Service for MSP Providers

Related Posts

Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network Cyber Security News
New HTTP/2 MadeYouReset Vulnerability Enables Large-Scale DDoS Attacks Cyber Security News
Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Cyber Security News
5 Best IT Infrastructure Modernisation Services In 2025 Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
  • Chinese MURKY PANDA Attacking Government and Professional Services Entities
  • Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts
  • CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks
  • New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News