+92 310 8202561
ccienca@gmail.com

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets

CCIE Academy | ccieacademy.org

Cybersecurity researchers have recently uncovered a large-scale attack campaign involving over 40 malicious browser extensions for Mozilla Firefox specifically designed to steal cryptocurrency wallet credentials, putting users’ digital assets at serious risk.

What’s Happening?

According to Koi Security researcher Yuval Ronen, these dangerous extensions are masquerading as popular crypto wallets from trusted platforms including:

  • Coinbase

  • MetaMask

  • Trust Wallet

  • Phantom

  • Exodus

  • OKX

  • Keplr

  • MyMonero

  • Bitget

  • Leap

  • Ethereum Wallet

  • Filfox

The malicious campaign has been active since at least April 2025, with some harmful extensions still being uploaded to the Firefox Add-ons store as recently as last week.

How Hackers Are Tricking Users

These fake extensions use several tactics to appear legitimate:

  • Fake 5-Star Reviews:
    The attackers artificially inflated positive reviews to make their extensions look trustworthy.

  • Stolen Branding:
    They copied the names and logos of real crypto wallets to deceive users.

  • Cloned Source Code:
    Some original wallet extensions were open-source, allowing attackers to clone the code, add malware, and preserve the original user experience to avoid suspicion.

  • Stealing Wallet Secrets:
    The malicious extensions are programmed to steal:

    • Wallet keys

    • Seed phrases

    • Victims’ external IP addresses

All stolen data is quietly sent to remote command-and-control (C2) servers.

Why This Is Dangerous

Unlike traditional phishing attacks that rely on fake websites or emails, these malicious extensions operate inside the browser, making them:

  • Harder to detect

  • Difficult to block with regular antivirus tools

β€œThis low-effort, high-impact approach allowed the attackers to maintain a smooth user experience while avoiding quick detection,” said Ronen.

Who Is Behind This?

Evidence suggests a Russian-speaking threat actor group based on:

  • Russian-language comments found in the malicious source code

  • Metadata from files on the attackers’ C2 server

What Has Been Done?

  • Mozilla has removed most of the identified extensions, except for MyMonero Wallet.

  • Mozilla has also developed an early detection system to block scam crypto wallet extensions before they spread.

How to Stay Safe

βœ”οΈ Only install browser extensions from verified, trusted developers.
βœ”οΈ Regularly review installed extensions.
βœ”οΈ Avoid extensions with suspiciously high ratings but low installation numbers.
βœ”οΈ Stay updated on cybersecurity alerts.

Final Thoughts from CCIE Academy

The discovery of these malicious Firefox extensions highlights the growing threat to cryptocurrency users. Browser-based attacks are becoming more creative and harder to detect. At CCIE Academy, we always recommend staying alert and following best security practices when dealing with browser add-ons and crypto assets.

For more cybersecurity updates and professional training, visit us at ccieacademy.org.