Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GhostPoster malware found in 17 Firefox add-ons with over 50,000 downloads
Identity

GhostPoster malware found in 17 Firefox add-ons with over 50,000 downloads

userBy userDecember 17, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 17, 2025Ravi LakshmananAd fraud/browser security

The new campaign, dubbed GhostPoster, utilized logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking codes, and commit click and ad fraud.

In total, the extension was downloaded more than 50,000 times, according to Koi Security, which discovered the campaign. Add-on is no longer available.

These browser programs were promoted as VPNs, screenshot utilities, ad blockers, and unofficial versions of Google Translate. The oldest add-on, Dark Mode, was launched on October 25, 2024 and provided the ability to enable a dark theme on all websites. The complete list of browser add-ons is below –

Free VPN Screenshot Weather (weather-best-forecast) Mouse Gestures (crxMouse) Caching – Fast Site Loader Free MP3 Downloader Google Translate (google-translate-right-clicks) Google Global VPN Translate – Free Forever Dark Reader Dark Mode Translation – Google Bing Baidu DeepL Weather (i-like-weather) Google Translate (google-translate-pro-extension)谷歌译libretv-watch-free-videos Ad Stop – Best Ad Blocker Google Translate (Right click to Google Translate)

cyber security

“What they actually deliver is a multi-stage malware payload that monitors everything you view, strips away the browser’s security protections, and opens a backdoor for remote code execution,” said security researchers Lotan Selly and Noga Gouldman.

The attack chain begins when the logo file is fetched when one of the above extensions is loaded. The malicious code parses the file for markers containing the “===” symbol and extracts JavaScript code, an external server (a loader that accesses “www.liveupdt”).[.]com” or “www.dealctr[.]com”) to get the main payload and wait 48 hours between each attempt.

To further avoid detection, the loader is configured to only fetch the payload 10% of the time. This randomness is a deliberate choice introduced to circumvent efforts to monitor network traffic. The retrieved payload is a comprehensive custom-encoded toolkit that can monetize browser activity in four different ways without the victim’s knowledge.

Affiliate link hijacking. It intercepts affiliate links to e-commerce sites such as Taobao and JD.com and steals commissions from legitimate affiliates. Tracking injection. Silent profiling by inserting Google Analytics tracking code into every web page visited by the victim. Security header stripping. Removes security headers such as Content-Security-Policy and X-Frame-Options from HTTP responses, exposing users to clickjacking and cross-site scripting attacks. Hidden iframe injection. Injects a hidden iframe into a page to load a URL from an attacker-controlled server, enabling advertising and click fraud. CAPTCHA bypass. They use various methods to bypass CAPTCHA challenges and circumvent bot detection safeguards.

“Why would malware need to bypass CAPTCHA? Because some malware operations, such as hidden iframe injections, trigger bot detection,” the researchers explain. “In order for malware to continue working, it must prove that it is ‘human’.”

In addition to probability checks, the add-on also incorporates a time-based delay that prevents malware from activating until at least 6 days after installation. These layered evasion techniques make it difficult to detect what is happening behind the scenes.

cyber security

We would like to emphasize here that while not all of the extensions listed above use the same steganographic attack chain, the fact that they all exhibit the same behavior and communicate with the same command-and-control (C2) infrastructure indicates that this is the work of a single attacker or group that has experimented with different temptations and techniques.

This development comes just days after it was discovered that popular VPN extensions for Google Chrome and Microsoft Edge were secretly collecting AI conversations from ChatGPT, Claude, and Gemini and leaking them to data brokers. In August 2025, another Chrome extension named FreeVPN.One was observed collecting screenshots, system information, and user location information.

“Free VPNs promise privacy, but nothing in life comes for free,” says Koi Security. “Time and time again, they provide oversight instead.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleData-driven innovation to improve animal health
Next Article EuroHPC JU launches public offering of 4 million euros to transform HPC system benchmarks
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.