Skip to content

Notorious hack on Firefox leads to theft of more than $1 million in cryptocurrency by the malicious group known as GreedyBear.

Cryptocurrency theft through deceitful Firefox extensions by GreedyBear: Exclusive insights into the scam and precautions for user safety.

Cybercriminals exploit Firefox vulnerability, pocketing more than $1 million worth of...
Cybercriminals exploit Firefox vulnerability, pocketing more than $1 million worth of cryptocurrency in the process.

Notorious hack on Firefox leads to theft of more than $1 million in cryptocurrency by the malicious group known as GreedyBear.

In a recent cyberattack, known as Extension Hollowing, hackers have found a cunning way to bypass security measures and steal cryptocurrency from unsuspecting users. This attack, which has been making waves in the digital world, was most notably seen in the "GreedyBear" campaign targeting Firefox users.

Extension Hollowing is a technique where threat actors first submit benign, seemingly harmless versions of browser extensions to official marketplaces. These extensions pass security reviews as they exhibit no malicious behaviour. After gaining user trust through fake positive reviews and appearing legitimate over time, the attackers remotely update these extensions with malicious code. This malicious update "hollows out" the original legitimate extension, effectively replacing its code with harmful functionality, such as stealing crypto wallet credentials or other sensitive data, while bypassing initial security safeguards put in place by the browser vendors [1][2].

In the GreedyBear campaign, attackers uploaded over 150 extensions that mimicked popular crypto wallets like MetaMask and Exodus with initially clean code. After approval, the extensions were weaponized to steal over $1 million in cryptocurrency by capturing users' wallet credentials and exfiltrating data to attacker-controlled servers [1][2].

To stay safe, users should install extensions only from highly trusted and official sources and remain cautious about newly published or little-known extensions, even if they have positive reviews, as these can be faked [1][2]. Using hardware wallets for cryptocurrency storage, rather than relying solely on browser extensions, is strongly recommended to mitigate theft risk [2].

Developers and browser vendors should also take necessary measures to protect their users. This includes implementing continuous monitoring of extensions after initial approval, including detecting unexpected updates that introduce malicious code. Strengthening review processes to include dynamic behaviour analysis and enforcing stricter controls on update mechanisms can help mitigate extension hollowing attacks [1][2].

Additional defences such as stronger authentication mechanisms, multi-signature wallets, and user awareness about credential safety can further reduce the impact of such attacks [2].

In summary, Extension Hollowing abuses the update mechanism of browser extensions to introduce malware after initial validation, with users best protected by caution in extension installation, hardware wallet use, and vigilance regarding extension behaviour and updates [1][2].

Users who have installed seemingly safe extensions should also check their crypto wallets for any unusual activity. For critical crypto transactions, using hardware wallets or trusted apps is recommended instead of browser extensions.

Browser companies like Mozilla need to prioritize improving extension checking and monitoring processes to prevent such attacks in the future. Unusual browser behaviour, such as unexpected pop-ups or slow performance, should be monitored closely. Keeping the browser and security software up to date is necessary for security.

It's important to remember that browser extensions from untrusted developers can pose a risk to crypto safety. The details of this major breach were reported by Cryptonews.

As we navigate the digital world, it's crucial to stay vigilant and take necessary precautions to protect our valuable assets. By following these guidelines, we can significantly reduce the risk of falling victim to cyberattacks like Extension Hollowing.

[1] Cybersecurity Insiders

[2] Cryptonews

  1. To safeguard their cryptocurrency assets, users should prioritize installing extensions only from trusted sources and avoid relying solely on browser extensions for storage, considering using hardware wallets instead.
  2. Browser vendors and developers should take proactive measures to combat Extension Hollowing attacks, such as implementing continuous monitoring of extensions, dynamic behavior analysis in the review process, and stricter controls on update mechanisms.

Read also:

    Latest