Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Posted on July 3, 2025July 3, 2025 By CWS

Jul 03, 2025Ravie LakshmananBrowser Safety / Cryptocurrency
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox which can be designed to steal cryptocurrency pockets secrets and techniques, placing customers’ digital belongings in danger.
“These extensions impersonate official pockets instruments from widely-used platforms reminiscent of Coinbase, MetaMask, Belief Pockets, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Pockets, and Filfox,” Koi Safety researcher Yuval Ronen mentioned.
The massive-scale marketing campaign is alleged to have been ongoing since no less than April 2025, with new extensions uploaded to the Firefox Add-ons retailer as lately as final week.

The recognized extensions have been discovered to artificially inflate their reputation, including tons of of 5-star opinions that go far past the full variety of energetic installations. This technique is employed to offer them an phantasm of authenticity, making it look like they’re broadly adopted and tricking unsuspecting customers into putting in them.
One other tactic adopted by the risk actor to bolster belief entails passing off these add-ons as official pockets instruments, utilizing the identical names and logos.
The truth that among the precise extensions have been open-source allowed the attackers to clone their supply code and inject their very own malicious performance to extract pockets keys and seed phrases from focused web sites and exfiltrate them to a distant server. The rogue extensions have additionally been discovered to transmit the victims’ exterior IP addresses.In contrast to typical phishing scams that depend on pretend web sites or emails, these extensions function contained in the person’s browser—making them far tougher to detect or block with conventional endpoint instruments.
“This low-effort, high-impact strategy allowed the actor to take care of anticipated person expertise whereas decreasing the probabilities of rapid detection,” Ronen mentioned.
The presence of Russian language feedback within the supply code in addition to metadata obtained from a PDF file retrieved from the command-and-control (C2) server used for the exercise factors to a Russian-speaking risk actor group.

All of the recognized add-ons except MyMonero Pockets have since been taken down by Mozilla. Final month, the browser maker mentioned it has developed an “early detection system” to detect and block rip-off crypto pockets extensions earlier than they achieve reputation amongst customers and are used to steal customers’ belongings by tricking them into getting into their credentials.
To mitigate the danger posed by such threats, it is suggested to put in extensions solely from verified publishers and vet them to make sure that they do not silently change their habits post-installation.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Assets, Cryptocurrency, Extensions, Firefox, Malicious, Stealing, Target, User, Wallets

Post navigation

Previous Post: The Hidden Weaknesses in AI SOC Tools that No One Talks About
Next Post: Cisco Warns of Hardcoded Credentials in Enterprise Software

Related Posts

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack The Hacker News
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
AI Is Transforming Cybersecurity Adversarial Testing The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
Wazuh for Regulatory Compliance The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark