Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Posted on January 13, 2026January 13, 2026 By CWS

Jan 13, 2026Ravie LakshmananWeb Safety / On-line Fraud
Cybersecurity researchers have disclosed particulars of a malicious Google Chrome extension that is able to stealing API keys related to MEXC, a centralized cryptocurrency change (CEX) out there in over 170 nations, whereas masquerading as a instrument to automate buying and selling on the platform.
The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and continues to be out there on the Chrome Net Retailer as of writing. It was first printed on September 1, 2025, by a developer named “jorjortan142.”
“The extension programmatically creates new MEXC API keys, allows withdrawal permissions, hides that permission within the person interface (UI), and exfiltrates the ensuing API key and secret to a hardcoded Telegram bot managed by the menace actor,” Socket safety researcher Kirill Boychenko mentioned in an evaluation.
In keeping with the Chrome Net Retailer itemizing, the online browser add-on is described as an extension that “simplifies connecting your buying and selling bot to the MEXC change” by producing the API keys with the mandatory permissions on the administration web page, together with to facilitate buying and selling and withdrawals.

In doing so, the put in extension allows a menace actor to manage any MEXC account accessed from the compromised browser, permitting them to execute trades, carry out automated withdrawals, and even drain the wallets and balances reachable by the service.
“In observe, as quickly because the person navigates to MEXC’s API administration web page, the extension injects a single content material script, script.js, and begins working contained in the already authenticated MEXC session,” Socket added. To attain this, the extension checks if the present URL accommodates the string “/person/openapi,” which refers back to the API key administration web page.
The script then programmatically creates a brand new API key and ensures that withdrawal functionality is enabled. On the identical time, it tampers with the web page’s person interface to present the impression to the person that the withdrawal permission has been disabled. As quickly as the method to generate the Entry Key and Secret Secret’s full, the script extracts each the values and transmits them to a hard-coded Telegram bot underneath the menace actor’s management utilizing an HTTPS POST request.
The menace poses a extreme threat, because it stays energetic so long as the keys are legitimate and never revoked, granting the attackers unfettered entry to the sufferer’s account even when they find yourself uninstalling the extension from the Chrome browser.
“In impact, the menace actor makes use of the Chrome Net Retailer because the supply mechanism, the MEXC internet UI because the execution setting, and Telegram because the exfiltration channel,” Boychenko famous. “The result’s a purpose-built credential-stealing extension that targets MEXC API keys in the meanwhile they’re created and configured with full permissions.”
The assault is made doable by the truth that it leverages an already authenticated browser session to comprehend its targets, thereby obviating the necessity for acquiring a person’s password or bypassing authentication protections.

It is at the moment not clear who’s behind the operation, however a reference to “jorjortan142” factors to an X deal with with the identical identify that hyperlinks to a Telegram bot named SwapSushiBot, which can be promoted throughout TikTok and YouTube. The YouTube channel was created on August 17, 2025.
“By hijacking a single API workflow contained in the browser, menace actors can bypass many conventional controls and go straight for lengthy lived API keys with withdrawal rights,” Socket mentioned. “The identical playbook will be readily tailored to different exchanges, DeFi dashboards, dealer portals, and any internet console that points tokens in session, and future variants are more likely to introduce heavier obfuscation, request broader browser permissions, and bundle assist for a number of platforms right into a single extension.”

The Hacker News Tags:API, Chrome, Extension, Keys, Malicious, Masquerading, MEXC, Steals, Tool, Trading

Post navigation

Previous Post: GoBruteforcer Botnet Targeting Crypto, Blockchain Projects
Next Post: Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages

Related Posts

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers The Hacker News
Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake The Hacker News
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity The Hacker News
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
  • GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark