Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Consumer watchdog warns about Google’s AI agent shopping protocols — Google says she’s wrong

Doctors think AI can play a role in medicine, but maybe not as chatbots

Long-running web skimming campaign steals credit cards from online checkout pages

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious Chrome extension steals MEXC API keys by pretending to be a trading tool
Identity

Malicious Chrome extension steals MEXC API keys by pretending to be a trading tool

userBy userJanuary 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 13, 2026Ravi LakshmananWeb security/online fraud

Cybersecurity researchers have detailed a malicious Google Chrome extension that can steal API keys related to MEXC, a centralized cryptocurrency exchange (CEX) available in more than 170 countries, while masquerading as a tool to automate transactions on the platform.

The extension is called MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads, and is still available in the Chrome Web Store at the time of writing. It was first published on September 1, 2025 by a developer named ‘jorjortan142’.

“The extension programmatically creates new MEXC API keys, enables withdrawal privileges, hides them in the user interface (UI), and leaks the generated API keys and secrets to a hardcoded Telegram bot controlled by the threat actor,” Sockets security researcher Kirill Boychenko said in an analysis.

According to the Chrome Web Store listing, this web browser add-on is described as an extension that “simplifies connecting trading bots to MEXC exchanges” by generating API keys with the necessary permissions on the admin page, including facilitating trading and withdrawals.

cyber security

The installed extension then allows the attacker to take control of any MEXC account accessed from the compromised browser, allowing them to perform transactions, perform automated withdrawals, and even drain wallets and balances accessible through the service.

“In practice, as soon as the user navigates to MEXC’s API management page, the extension injects a single content script, script.js, and starts working within an already authenticated MEXC session,” Socket added. To accomplish this, the extension checks if the current URL contains the string “/user/openapi”, which refers to the API key management page.

Next, the script programmatically creates a new API key and ensures that the withdrawal feature is enabled. At the same time, they deface the page’s user interface to give users the impression that withdrawal permissions are disabled. Once the process of generating the access and private keys is complete, the script extracts both values ​​and sends them using an HTTPS POST request to a hard-coded Telegram bot under the threat actor’s control.

This threat poses a significant risk because it remains active as long as the key is valid and not revoked, giving an attacker unfettered access to the victim’s account even if the extension is uninstalled from the Chrome browser.

“In effect, the attackers are using the Chrome Web Store as their delivery mechanism, MEXC Web UI as their execution environment, and Telegram as their exfiltration channel,” Boychenko noted. “The result is a proprietary credential-stealing extension that targets MEXC API keys once they are created and configured with full privileges.”

This attack is possible by leveraging an already authenticated browser session to accomplish its goals, eliminating the need to obtain the user’s password or bypass authentication protections.

cyber security

It is not currently clear who is behind this operation, but references to “jorjortan142” point to an X handle of the same name that links to a Telegram bot named SwapSushiBot. SwapSushiBot is also promoted across TikTok and YouTube. YouTube channel was created on August 17, 2025.

“By hijacking a single API workflow within the browser, attackers can bypass many traditional controls and directly obtain long-lived API keys with revocation rights,” Socket said. “The same playbook can easily be applied to other exchanges, DeFi dashboards, broker portals, and web consoles that issue tokens during a session. Future variants may introduce stronger obfuscation, request broader browser permissions, and bundle support for multiple platforms into a single extension.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIndia has reportedly told quick commerce companies to withdraw their 10-minute delivery promises.
Next Article Long-running web skimming campaign steals credit cards from online checkout pages
user
  • Website

Related Posts

Long-running web skimming campaign steals credit cards from online checkout pages

January 13, 2026

From MCP and tool access to shadow API key sprawl

January 13, 2026

New advanced Linux VoidLink malware targets cloud and container environments

January 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Consumer watchdog warns about Google’s AI agent shopping protocols — Google says she’s wrong

Doctors think AI can play a role in medicine, but maybe not as chatbots

Long-running web skimming campaign steals credit cards from online checkout pages

Malicious Chrome extension steals MEXC API keys by pretending to be a trading tool

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.