AInvest Newsletter
Daily stocks & crypto headlines, free to your inbox
A sophisticated cybercrime operation known as the GreedyBear cybercrime group has exploited browser extensions and malware to steal over $1 million in cryptocurrency from victims. The group employs a multi-layered approach that includes the deployment of over 150 fake browser extensions designed to mimic popular cryptocurrency wallets like MetaMask and TronLink [1]. These extensions are distributed through trusted platforms such as the Firefox add-ons store, where they appear legitimate but contain scripts that track user activity and extract sensitive data, including wallet addresses and private keys [4].
In addition to browser extensions, the GreedyBear group has distributed nearly 500 samples of crypto-themed malware, some of which include ransomware and credential stealers [1]. These malicious files are often delivered through phishing emails and scam websites that imitate well-known cryptocurrency services, deceiving users into downloading what they believe to be genuine software [4]. Once installed, the malware connects to a command-and-control server, allowing attackers to maintain persistent access and continuously exfiltrate data from victims’ systems.
The scale and coordination of the GreedyBear campaign suggest an "industrial" level of cybercriminal activity, with a single IP address reportedly controlling the entire operation [1]. This indicates a high degree of organization and resource allocation within the group. The timing of the attacks also aligns with increased interest in decentralized finance and crypto trading, making users more susceptible to installing third-party tools that promise enhanced functionality or better market insights [4].
Security experts have emphasized the risks associated with browser extensions in the cryptocurrency ecosystem. While many such tools provide valuable services, they also serve as entry points for cybercriminals to exploit. To mitigate the threat, users are advised to verify the authenticity of extensions by cross-checking developer information, user reviews, and installation sources before downloading [1].
The GreedyBear cybercrime group underscores the evolving tactics of cybercriminals targeting the cryptocurrency space. As digital assets become more mainstream, attackers are leveraging increasingly sophisticated methods to bypass security measures and exploit user trust. Staying informed and adopting strict cybersecurity practices remain essential for individuals to protect their digital assets [4].
Source:
[1] Cointelegraph - [https://cointelegraph.com/news/greedybear-scam-crypto-theft-industrial-scale-koi-security](https://cointelegraph.com/news/greedybear-scam-crypto-theft-industrial-scale-koi-security)
[4] Pulsedive - [https://pulsedive.com/dashboard/](https://pulsedive.com/dashboard/)

Quickly understand the history and background of various well-known coins

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025
Daily stocks & crypto headlines, free to your inbox
Comments
No comments yet