Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » greedybear uses 150+ malicious Firefox wallet extensions to steal $1 million in crypto.
Identity

greedybear uses 150+ malicious Firefox wallet extensions to steal $1 million in crypto.

userBy userAugust 8, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Malicious Firefox Wallet Extension

A newly discovered campaign called GreedyBear leverages over 150 malicious extensions on the Firefox market, designed to steal more than $1 million in digital assets by impersonating a popular cryptocurrency wallet.

According to Tuval Admoni, a security researcher at KOI, published browser add-on masquerades such as Metamask, Tronlink, Exodus and Rabby Wallet, are

What is noteworthy is that threat actors use techniques cybersecurity companies call extended hollow, to be used by Mozilla to bypass safeguards that exploit user trusts. It is worth noting that several aspects of the campaign were first documented last week by security researcher Lukasz Olejnik.

“Instead of trying to steal malicious extensions past the initial review, we’ll first build a legal expansion portfolio and then create weapons when no one is looking,” Admoni said in a report released Thursday.

To achieve this, the attacker first creates a publisher account in the market, uploads harmless extensions with real features, avoiding initial reviews, posting fake positive reviews, creating a credibility illusion, and modifying the inside with malicious features.

Cybersecurity

The fake extension is designed to capture wallet credentials entered by unsuspecting users and remove them to an attacker control server. We also collect the victim’s IP address for tracking purposes.

With similar goals in mind, the campaign is rated as an extension of a previous iteration called Foxy Wallet, which includes threat actors that publish more than 40 malicious browser extensions for Mozilla Firefox. The latest spikes in the number of expansions indicate an increase in the scale of the operation.

Fake wallet cryptocurrency emissions attacks are augmented by campaigns that distribute malicious executables across various Russian sites, stomping cracks and pirated software, leading to information theft and deployment of ransomware.

The actors of GreedyBear discover the setup of fraudulent sites that come as cryptocurrency products and services, such as wallet repair tools, and users can split wallet credentials or payment details, leading to credentials and financial fraud.

Koi Security said that three attack verticals can be linked to a single threat actor based on the fact that all domains used in these efforts point to a single IP address: 185.208.156[.]66 acts as a command and control (C2) server for data collection and management.

There is evidence to suggest that extension-related attacks diverge to target other browser markets. This is based on the discovery of a Google Chrome extension that uses the same C2 server and underlying logic to steal credentials.

Worse, the artifact analysis reveals indications that it may have been created using AI-powered tools. This highlights the increasing misuse of AI systems by threat actors to enable attacks at scale and at speed.

“This variety shows that the group is not deploying a single tool set, but rather operating a wide range of malware distribution pipelines that allow them to change tactics when needed,” Admoni said.

“The difference then is scale and scope. This evolved into a multi-platform credential and asset theft campaign backed by hundreds of malware samples and fraud infrastructure.”

Ethereum Drone Posses as a trading bot to steal crypto

This disclosure comes when Sentinel Laws flag a widespread, ongoing cryptocurrency fraud that involves distributing malicious smart contracts disguised as trading bots to discharge user wallets. The fraudulent Ethereum Droner scheme, which has been active since early 2024, is estimated to have already acquired more than $900,000 threat actors in stolen profits.

Identity Security Risk Assessment

“The scams are being sold through YouTube videos that explain the nature of Crypto Trading Bots and how to deploy smart contracts to the Remix Solidity Compiler Platform, a web-based integrated development environment (IDE) for web3 projects,” said researcher Alex Delamotte. “The video description shares a link to an external site that hosts weaponized smart contract codes.”

The video is said to be AI-generated and is published by senior accounts who post cryptocurrency news from other sources as playlists to build legality. The video also features overwhelmingly positive comments, suggesting that threat actors are actively curating the comment section and removing negative feedback.

One of the YouTube accounts promoting fraud was created in October 2022. This shows that the scammers have slowly and steadily increased the account’s reliability over the long term.

The attack moves to the next phase when the victim deploys a smart contract. The victim is then instructed to send the ETH to a new contract. This routes funds to an obfuscated threat actor-controlled wallet.

“The combination of AI-generated content and sellable YouTube accounts means that actors with discreet resources can obtain a YouTube account that deems the algorithm “established” and weaponizes the account and posts customized content under the false pretext of legitimacy,” Delamott said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePFAS Group Chemicals – Search, Capture, Destruction
Next Article The importance of breast density monitoring
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.