Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims

Posted on August 8, 2025August 8, 2025 By CWS

A complicated cybercriminal operation often known as GreedyBear has orchestrated one of the intensive cryptocurrency theft campaigns to this point, deploying over 650 malicious instruments throughout a number of assault vectors to steal greater than $1 million from unsuspecting victims.

In contrast to conventional risk teams that sometimes specialise in single assault strategies, GreedyBear has adopted an industrial-scale strategy, concurrently working malicious browser extensions, distributing lots of of malware executables, and sustaining elaborate phishing infrastructure.

The marketing campaign represents a major escalation in cybercriminal operations, using over 150 weaponized Firefox extensions, almost 500 malicious Home windows executables, and dozens of fraudulent web sites masquerading as respectable cryptocurrency companies.

Generic extensions uploaded by the attacker earlier than weaponized (Supply – Medium)

All assault elements converge on a centralized command-and-control infrastructure, with domains resolving to the IP deal with 185.208.156.66, enabling streamlined coordination throughout a number of risk vectors.

What distinguishes GreedyBear from typical cybercriminal operations is its systematic strategy to scaling assaults utilizing synthetic intelligence.

Evaluation of the marketing campaign’s code reveals clear signatures of AI-generated artifacts, permitting attackers to quickly produce numerous payloads whereas evading conventional detection mechanisms.

Koi Safety researchers recognized this evolution as a part of a broader pattern the place cybercriminals leverage superior AI tooling to speed up assault improvement and deployment.

The risk group’s browser extension technique employs a complicated approach termed “Extension Hollowing” to bypass market safety controls.

Slightly than trying to sneak malicious extensions previous preliminary evaluations, operators first set up respectable writer profiles by importing innocuous utilities corresponding to hyperlink sanitizers and YouTube downloaders.

After accumulating optimistic evaluations and consumer belief, they systematically “hole out” these extensions, changing respectable performance with credential-harvesting code whereas preserving the established repute.

Superior Credential Harvesting Mechanisms

The weaponized extensions show exceptional technical sophistication of their credential extraction capabilities.

One of many trojans obtain web page from rsload.web (Supply – Medium)

Every malicious extension targets widespread cryptocurrency wallets together with MetaMask, TronLink, Exodus, and Rabby Pockets by exactly mimicking their genuine interfaces.

The malware captures pockets credentials immediately from consumer enter fields inside the extension’s popup interface, using JavaScript features that intercept type submissions earlier than they attain respectable validation processes.

Pockets-repair companies claiming to repair Trezor gadgets (Supply – Medium)

Throughout initialization, the extensions execute extra surveillance features, transmitting victims’ exterior IP addresses to distant servers for monitoring and potential focusing on functions.

This information assortment allows operators to construct complete sufferer profiles whereas sustaining operational safety by way of distributed infrastructure.

The code snippets reveal standardized credential exfiltration routines throughout all extensions, suggesting centralized improvement and deployment protocols that allow fast scaling of malicious operations whereas sustaining consistency in assault execution.

Equip your SOC with full entry to the most recent risk information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attack, Biggest, GreedyBear, Hacking, Million, Stolen, Tools, Victims

Post navigation

Previous Post: French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers
Next Post: Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials

Related Posts

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News
Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
10 Best NGINX Monitoring Tools Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top 10 Best Supply Chain Risk Management Solutions in 2025
  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top 10 Best Supply Chain Risk Management Solutions in 2025
  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News