Russian Hackers Swipe $1M in Crypto Through Firefox Extensions



GreedyBear’s Aggressive Cyber Assault on Cryptocurrency Users

A notorious cybercriminal group, GreedyBear, with alleged ties to Russia, has dramatically intensified its illicit activities, focusing on the global cryptocurrency community. Recently, the group launched a sophisticated campaign involving 150 weaponized Firefox extensions. Their primary targets are cryptocurrency users, with a keen focus on English-speaking individuals. Over a mere five weeks, GreedyBear successfully pilfered over $1 million in cryptocurrency assets, as reported by cybersecurity firm Koi Security.



Extension Hollowing: A Deceptive Tactic

GreedyBear employs a cunning strategy known as “Extension Hollowing.” This involves initially releasing legitimate versions of popular crypto wallet extensions such as MetaMask, Exodus, Rabby Wallet, and TronLink. Once these extensions secure a foothold on users’ devices, the group updates them with malicious code. This sneaky maneuver allows the extensions to bypass security checks within the Firefox marketplace, remaining undetected for prolonged periods. When installed, these extensions clandestinely extract sensitive wallet credentials from users’ browsers, allowing cybercriminals to access and empty their cryptocurrency accounts. Further compounding the deception, GreedyBear fabricates positive reviews to foster user trust.

Beyond Browser Extensions: A Broader Threat

In addition to their Firefox extension exploits, GreedyBear has dispersed nearly 500 malicious Windows executable files on Russian software distribution platforms. These files often contain credential stealers, ransomware, and trojans, bundled with pirated or altered software. The group also operates numerous phishing websites, cleverly mimicking legitimate cryptocurrency services to deceive users into surrendering personal and financial information. These fraudulent sites enable GreedyBear to harvest login credentials and siphon funds from unsuspecting victims.



Centralized Operations Indicate Sophistication

Analysis reveals that most of GreedyBear’s attack domains are linked to a single IP address—185.208.156.66. This indicates a centralized infrastructure, suggesting a limited number of operators or possibly a shared command-and-control system. This structured and coordinated approach reflects the group’s growing sophistication and operational scale.

Heightened Risks for Cryptocurrency Users

The GreedyBear campaign underscores the growing threat landscape facing cryptocurrency users. As reliance on browser extensions and downloadable software for managing digital assets increases, so does the risk of exposure to malicious actors like GreedyBear. Security experts advise users to exercise vigilance, especially when downloading extensions or software from third-party sources. Adopting best practices such as using verified software, enabling multi-factor authentication, and regularly updating applications is critical to mitigating these risks.

For further information, visit: https://www.ainvest.com/news/russian-hackers-steal-1m-crypto-150-firefox-extensions-2508/

GreedyBear Cyber Attack Image

Hot Topics

Related Articles