GreedyBear Crypto Scammers Steal Over $1 Million with Fake Extensions, Malware, and Scam Websites
PorAinvest
viernes, 8 de agosto de 2025, 4:03 am ET1 min de lectura
FIL--
The GreedyBear group has deployed over 150 fake browser extensions that impersonate popular wallets such as MetaMask and TronLink. These extensions are designed to capture user credentials and exfiltrate them to an attacker-controlled server [1]. The campaign also involves distributing malicious executables through various Russian sites, leading to the deployment of credential stealers and ransomware [1].
In addition to browser extensions, GreedyBear has set up scam sites that pose as cryptocurrency products and services. These sites aim to trick users into parting with their wallet credentials or payment details, resulting in credential theft and financial fraud [1].
Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation [1]. The group's use of a single IP address (185.208.156[.]66) as a command-and-control (C2) server for data collection and management further indicates a well-organized and coordinated effort [1].
The campaign has since evolved to target other browser marketplaces. A Google Chrome extension named Filecoin Wallet has used the same C2 server and underlying logic to pilfer credentials, indicating a broadening of the group's attack scope [1].
The GreedyBear group's tactics are evolving, and they are not deploying a single toolset but rather operating a broad malware distribution pipeline capable of shifting tactics as needed [1]. This adaptability underscores the need for robust cybersecurity measures to protect against such sophisticated threats.
References:
[1] https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
[2] https://en.coinotag.com/greedybear-cybercrime-group-exploits-browser-extensions-and-malware-to-steal-over-1-million-in-crypto/
GreedyBear, a cryptocurrency threat actor group, has stolen over $1 million through a campaign that includes malicious browser extensions, malware, and scam websites. The group has deployed over 650 malicious tools targeting cryptocurrency wallet users and has used AI-generated code to scale and diversify attacks. Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation.
A newly discovered campaign dubbed GreedyBear has leveraged over 650 malicious tools to steal over $1 million in cryptocurrency. The campaign, which includes malicious browser extensions, malware, and scam websites, has targeted cryptocurrency wallet users and employed AI-generated code to scale and diversify attacks [1].The GreedyBear group has deployed over 150 fake browser extensions that impersonate popular wallets such as MetaMask and TronLink. These extensions are designed to capture user credentials and exfiltrate them to an attacker-controlled server [1]. The campaign also involves distributing malicious executables through various Russian sites, leading to the deployment of credential stealers and ransomware [1].
In addition to browser extensions, GreedyBear has set up scam sites that pose as cryptocurrency products and services. These sites aim to trick users into parting with their wallet credentials or payment details, resulting in credential theft and financial fraud [1].
Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation [1]. The group's use of a single IP address (185.208.156[.]66) as a command-and-control (C2) server for data collection and management further indicates a well-organized and coordinated effort [1].
The campaign has since evolved to target other browser marketplaces. A Google Chrome extension named Filecoin Wallet has used the same C2 server and underlying logic to pilfer credentials, indicating a broadening of the group's attack scope [1].
The GreedyBear group's tactics are evolving, and they are not deploying a single toolset but rather operating a broad malware distribution pipeline capable of shifting tactics as needed [1]. This adaptability underscores the need for robust cybersecurity measures to protect against such sophisticated threats.
References:
[1] https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
[2] https://en.coinotag.com/greedybear-cybercrime-group-exploits-browser-extensions-and-malware-to-steal-over-1-million-in-crypto/

Divulgación editorial y transparencia de la IA: Ainvest News utiliza tecnología avanzada de Modelos de Lenguaje Largo (LLM) para sintetizar y analizar datos de mercado en tiempo real. Para garantizar los más altos estándares de integridad, cada artículo se somete a un riguroso proceso de verificación con participación humana.
Mientras la IA asiste en el procesamiento de datos y la redacción inicial, un miembro editorial profesional de Ainvest revisa, verifica y aprueba de forma independiente todo el contenido para garantizar su precisión y cumplimiento con los estándares editoriales de Ainvest Fintech Inc. Esta supervisión humana está diseñada para mitigar las alucinaciones de la IA y garantizar el contexto financiero.
Advertencia sobre inversiones: Este contenido se proporciona únicamente con fines informativos y no constituye asesoramiento profesional de inversión, legal o financiero. Los mercados conllevan riesgos inherentes. Se recomienda a los usuarios que realicen una investigación independiente o consulten a un asesor financiero certificado antes de tomar cualquier decisión. Ainvest Fintech Inc. se exime de toda responsabilidad por las acciones tomadas con base en esta información. ¿Encontró un error? Reportar un problema



Comentarios
Aún no hay comentarios