GreedyBear Crypto Scammers Steal Over $1 Million with Fake Extensions, Malware, and Scam Websites
ByAinvest
Friday, Aug 8, 2025 4:03 am ET1min read
FIL--
The GreedyBear group has deployed over 150 fake browser extensions that impersonate popular wallets such as MetaMask and TronLink. These extensions are designed to capture user credentials and exfiltrate them to an attacker-controlled server [1]. The campaign also involves distributing malicious executables through various Russian sites, leading to the deployment of credential stealers and ransomware [1].
In addition to browser extensions, GreedyBear has set up scam sites that pose as cryptocurrency products and services. These sites aim to trick users into parting with their wallet credentials or payment details, resulting in credential theft and financial fraud [1].
Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation [1]. The group's use of a single IP address (185.208.156[.]66) as a command-and-control (C2) server for data collection and management further indicates a well-organized and coordinated effort [1].
The campaign has since evolved to target other browser marketplaces. A Google Chrome extension named Filecoin Wallet has used the same C2 server and underlying logic to pilfer credentials, indicating a broadening of the group's attack scope [1].
The GreedyBear group's tactics are evolving, and they are not deploying a single toolset but rather operating a broad malware distribution pipeline capable of shifting tactics as needed [1]. This adaptability underscores the need for robust cybersecurity measures to protect against such sophisticated threats.
References:
[1] https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
[2] https://en.coinotag.com/greedybear-cybercrime-group-exploits-browser-extensions-and-malware-to-steal-over-1-million-in-crypto/
GreedyBear, a cryptocurrency threat actor group, has stolen over $1 million through a campaign that includes malicious browser extensions, malware, and scam websites. The group has deployed over 650 malicious tools targeting cryptocurrency wallet users and has used AI-generated code to scale and diversify attacks. Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation.
A newly discovered campaign dubbed GreedyBear has leveraged over 650 malicious tools to steal over $1 million in cryptocurrency. The campaign, which includes malicious browser extensions, malware, and scam websites, has targeted cryptocurrency wallet users and employed AI-generated code to scale and diversify attacks [1].The GreedyBear group has deployed over 150 fake browser extensions that impersonate popular wallets such as MetaMask and TronLink. These extensions are designed to capture user credentials and exfiltrate them to an attacker-controlled server [1]. The campaign also involves distributing malicious executables through various Russian sites, leading to the deployment of credential stealers and ransomware [1].
In addition to browser extensions, GreedyBear has set up scam sites that pose as cryptocurrency products and services. These sites aim to trick users into parting with their wallet credentials or payment details, resulting in credential theft and financial fraud [1].
Koi Security researcher Tuval Admoni described GreedyBear's approach as an industrial-scale crypto theft operation that blends multiple proven attack methods into one coordinated operation [1]. The group's use of a single IP address (185.208.156[.]66) as a command-and-control (C2) server for data collection and management further indicates a well-organized and coordinated effort [1].
The campaign has since evolved to target other browser marketplaces. A Google Chrome extension named Filecoin Wallet has used the same C2 server and underlying logic to pilfer credentials, indicating a broadening of the group's attack scope [1].
The GreedyBear group's tactics are evolving, and they are not deploying a single toolset but rather operating a broad malware distribution pipeline capable of shifting tactics as needed [1]. This adaptability underscores the need for robust cybersecurity measures to protect against such sophisticated threats.
References:
[1] https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
[2] https://en.coinotag.com/greedybear-cybercrime-group-exploits-browser-extensions-and-malware-to-steal-over-1-million-in-crypto/

Stay ahead of the market.
Get curated U.S. market news, insights and key dates delivered to your inbox.
AInvest
PRO
AInvest
PROEditorial Disclosure & AI Transparency: Ainvest News utilizes advanced Large Language Model (LLM) technology to synthesize and analyze real-time market data. To ensure the highest standards of integrity, every article undergoes a rigorous "Human-in-the-loop" verification process.
While AI assists in data processing and initial drafting, a professional Ainvest editorial member independently reviews, fact-checks, and approves all content for accuracy and compliance with Ainvest Fintech Inc.’s editorial standards. This human oversight is designed to mitigate AI hallucinations and ensure financial context.
Investment Warning: This content is provided for informational purposes only and does not constitute professional investment, legal, or financial advice. Markets involve inherent risks. Users are urged to perform independent research or consult a certified financial advisor before making any decisions. Ainvest Fintech Inc. disclaims all liability for actions taken based on this information. Found an error?Report an Issue



Comments
No comments yet