Cybercriminals Steal $1M via 150 Malicious Firefox Crypto Wallet Extensions

Generated by AI AgentCoin World
Sunday, Aug 10, 2025 11:31 am ET1min read
Aime RobotAime Summary

- Russian cybercriminal group GreedyBear stole $1M via 150 malicious Firefox extensions mimicking crypto wallets like MetaMask and Exodus.

- They bypassed Firefox security reviews using "Extension Hollowing," submitting benign versions before updating with malware to steal credentials.

- The group also deployed 500 malicious Windows executables and phishing sites, targeting English and Russian speakers through centralized IP 185.208.156.66.

- Koi Security warns against untrusted extensions and recommends hardware wallets from official sites to mitigate risks from such industrial-scale theft.

- The attack highlights vulnerabilities in crypto ecosystems, urging stronger authentication and multi-signature setups to combat evolving cyber threats.

A Russian-based cybercriminal group known as GreedyBear has launched a large-scale campaign targeting cryptocurrency users through the distribution of over 150 malicious Firefox extensions that mimic trusted crypto wallets like MetaMask, TronLink, and Exodus [4]. These fake extensions, which were initially approved on the Firefox Add-ons marketplace, bypassed security reviews through a method known as “Extension Hollowing” [1]. The tactic involves submitting benign versions of the extensions, which are later updated with malicious code to steal wallet credentials and siphon cryptocurrency [4]. According to Koi Security, this operation has already resulted in over $1 million in stolen assets within five weeks [1].

The group’s tactics also include the deployment of nearly 500 malicious Windows executables distributed through Russian-based software piracy sites and the creation of dozens of phishing websites posing as legitimate crypto services [4]. These websites are used to extract personal information and wallet credentials from unsuspecting users. The Firefox-based campaign primarily targets English-speaking users, while the executable-based attacks focus on Russian-speaking individuals [4]. Despite the diversity of methods, nearly all attack domains are traced back to a single IP address: 185.208.156.66, which serves as a central hub for coordination and data collection [1].

The centralized nature of the operation suggests a profit-driven cybercriminal group rather than a state-sponsored entity [4]. Idan Dardikman, CTO of Koi Security, noted that government-backed operations typically use distributed infrastructure to avoid centralized points of failure. GreedyBear’s activities reflect an evolving threat landscape in which attackers exploit user trust in well-known software brands to carry out industrial-scale theft [1]. The group’s use of fake reviews and social engineering techniques highlights the sophistication of their operations and the need for greater awareness among users regarding the risks associated with browser extensions [4].

Koi Security recommends that users only install extensions from verified developers with long histories and avoid untrusted or pirated software sites [4]. Dardikman also advised using hardware wallets for significant crypto holdings and purchasing them directly from official manufacturer websites, as GreedyBear has been known to create fake hardware wallet sites [4]. For those who rely on software wallets, the report emphasizes the importance of multi-signature setups and strong authentication protocols to prevent unauthorized access [4].

The scale and methodology of the GreedyBear campaign highlight the vulnerabilities in the broader cryptocurrency ecosystem, particularly the risks associated with decentralized finance and browser-based wallet usage [1]. As the attack vector evolves, so must the security measures employed by both platform providers and individual users. The incident also serves as a reminder of the growing trend in cybercrime that combines social engineering, phishing, and malware to extract sensitive information [1].

Source:

[1] https://gbhackers.com/record-breaking-greedybear-attack-uses-650-hacking-tools/

[4] https://thecyberpost.com/news/hackers/greedybear-steals-1m-in-crypto-using-150-malicious-firefox-wallet-extensions/

Comments



Add a public comment...
No comments

No comments yet