Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account

Posted on August 4, 2025August 4, 2025 By CWS

Mozilla has issued an pressing safety alert to its developer neighborhood following the detection of a complicated phishing marketing campaign particularly concentrating on AMO (addons.mozilla.org) accounts.

The corporate’s safety workforce, led by Scott DeVaney, reported on August 1, 2025, that cybercriminals are actively trying to compromise developer credentials via misleading emails claiming account updates are required to take care of entry to developer options.

Key Takeaways1. Mozilla detected phishing emails concentrating on add-on builders.2. Pretend emails use incorrect domains (like “mozila”) and fail SPF/DKIM/DMARC checks.3. Solely enter credentials on mozilla.org/firefox.com.

Targets Mozilla Add-on Builders 

The malicious marketing campaign makes use of rigorously crafted emails that masquerade as official Mozilla communications, sometimes containing variations of the message “Your Mozilla Add-ons account requires an replace to proceed accessing developer options”. 

These subtle phishing makes an attempt exploit builders’ considerations about sustaining entry to their publishing privileges on the AMO platform, which serves as the first distribution channel for Firefox extensions and add-ons.

Safety researchers have recognized a number of technical indicators that may assist builders distinguish legit communications from fraudulent ones. 

Genuine Mozilla emails completely originate from verified domains, together with firefox.com, mozilla.org, mozilla.com, and their respective subdomains. 

Moreover, legit emails go important e-mail authentication protocols, together with SPF (Sender Coverage Framework), DKIM (DomainKeys Recognized Mail), and DMARC (Area-based Message Authentication, Reporting, and Conformance) checks.

Proof from affected builders reveals that some phishing emails include apparent technical flaws, together with misspelled domains corresponding to “mozila” as an alternative of “mozilla,” which ought to function quick purple flags for recipients. 

Regardless of these obvious errors, the marketing campaign has efficiently compromised a minimum of one developer account, with one sufferer reporting they “fell for the phishing rip-off” earlier than shortly realizing the deception and deleting their extension.

Mozilla Suggestions

Mozilla’s safety advisory emphasizes a multi-layered strategy to safety, urging builders to implement strict verification procedures when dealing with suspicious communications. 

The corporate recommends that builders by no means click on embedded hyperlinks in emails claiming to be from Mozilla, as an alternative advocating for direct navigation to mozilla.org or firefox.com domains.

Crucial safety protocols embody validating that any hyperlinks inside emails level completely to verified Mozilla domains earlier than interplay, and making certain that Mozilla credentials are solely entered on official mozilla.org or firefox.com web sites. 

The corporate has additionally directed builders to further assets from the U.S. Federal Commerce Fee and the U.Okay. Nationwide Cyber Safety Centre for complete steerage on detecting and reporting phishing scams.

This incident highlights the rising menace panorama dealing with WebExtensions builders and the broader Mozilla ecosystem, as cybercriminals more and more goal developer accounts to distribute malicious code via trusted extension platforms probably.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Account, Addon, Attacks, Developers, Mozilla, Phishing, Targeting, Warns

Post navigation

Previous Post: Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
Next Post: NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Related Posts

Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks Cyber Security News
SpyCloud Launches Supply Chain Identity Protection SpyCloud Launches Supply Chain Identity Protection Cyber Security News
Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution Cyber Security News
North Korean Hackers Attacking Developers with 338 Malicious npm Packages North Korean Hackers Attacking Developers with 338 Malicious npm Packages Cyber Security News
Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations Cyber Security News
New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News