Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims

Posted on August 8, 2025August 8, 2025 By CWS

A complicated cybercriminal operation often known as GreedyBear has orchestrated one of the intensive cryptocurrency theft campaigns to this point, deploying over 650 malicious instruments throughout a number of assault vectors to steal greater than $1 million from unsuspecting victims.

In contrast to conventional risk teams that sometimes specialise in single assault strategies, GreedyBear has adopted an industrial-scale strategy, concurrently working malicious browser extensions, distributing lots of of malware executables, and sustaining elaborate phishing infrastructure.

The marketing campaign represents a major escalation in cybercriminal operations, using over 150 weaponized Firefox extensions, almost 500 malicious Home windows executables, and dozens of fraudulent web sites masquerading as respectable cryptocurrency companies.

Generic extensions uploaded by the attacker earlier than weaponized (Supply – Medium)

All assault elements converge on a centralized command-and-control infrastructure, with domains resolving to the IP deal with 185.208.156.66, enabling streamlined coordination throughout a number of risk vectors.

What distinguishes GreedyBear from typical cybercriminal operations is its systematic strategy to scaling assaults utilizing synthetic intelligence.

Evaluation of the marketing campaign’s code reveals clear signatures of AI-generated artifacts, permitting attackers to quickly produce numerous payloads whereas evading conventional detection mechanisms.

Koi Safety researchers recognized this evolution as a part of a broader pattern the place cybercriminals leverage superior AI tooling to speed up assault improvement and deployment.

The risk group’s browser extension technique employs a complicated approach termed “Extension Hollowing” to bypass market safety controls.

Slightly than trying to sneak malicious extensions previous preliminary evaluations, operators first set up respectable writer profiles by importing innocuous utilities corresponding to hyperlink sanitizers and YouTube downloaders.

After accumulating optimistic evaluations and consumer belief, they systematically “hole out” these extensions, changing respectable performance with credential-harvesting code whereas preserving the established repute.

Superior Credential Harvesting Mechanisms

The weaponized extensions show exceptional technical sophistication of their credential extraction capabilities.

One of many trojans obtain web page from rsload.web (Supply – Medium)

Every malicious extension targets widespread cryptocurrency wallets together with MetaMask, TronLink, Exodus, and Rabby Pockets by exactly mimicking their genuine interfaces.

The malware captures pockets credentials immediately from consumer enter fields inside the extension’s popup interface, using JavaScript features that intercept type submissions earlier than they attain respectable validation processes.

Pockets-repair companies claiming to repair Trezor gadgets (Supply – Medium)

Throughout initialization, the extensions execute extra surveillance features, transmitting victims’ exterior IP addresses to distant servers for monitoring and potential focusing on functions.

This information assortment allows operators to construct complete sufferer profiles whereas sustaining operational safety by way of distributed infrastructure.

The code snippets reveal standardized credential exfiltration routines throughout all extensions, suggesting centralized improvement and deployment protocols that allow fast scaling of malicious operations whereas sustaining consistency in assault execution.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attack, Biggest, GreedyBear, Hacking, Million, Stolen, Tools, Victims

Post navigation

Previous Post: French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers
Next Post: Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials

Related Posts

New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector
  • In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
  • US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations
  • What Attackers Are Doing With Them
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector
  • In Other News: Nvidia Says No to Backdoors, Satellite Hacking, Energy Sector Assessment
  • US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations
  • What Attackers Are Doing With Them
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 4)

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News