Cybersecurity Tips

๐Ÿšจ A Silent Heist: Fake Crypto Wallets Flood Firefox Add-Ons Store

UppSecEcho
UppSecEcho

July 09, 2025

The crypto world just got hit with another stealthy threatโ€”this time targeting unsuspecting Firefox users through malicious wallet extensions.

More than 40 fake Firefox extensions mimicking popular crypto wallets have been discovered since April 2025. These fraudulent add-ons, found directly on the Firefox Add-ons store, arenโ€™t just phishing scams, theyโ€™re sophisticated clones capable of stealing private keys and draining entire wallets.


๐Ÿ” The Deception: Looks Real, Acts Evil

The attackers didnโ€™t build these fake extensions from scratch. Instead, they forked open-source code from legitimate wallets, like MetaMask, Phantom, Trust Wallet, OKX, Bitget, and Coinbase Wallet, and injected malicious scripts designed to silently steal user data.

To make things worse, the extensions:

โ€ข Used identical names and logos

โ€ข Were stuffed with fake 5-star reviews

โ€ข In some cases, were signed with valid Mozilla developer accounts

These wallet clones were nearly indistinguishable from the real thing. And once installed, they watched for one thing: your seed phrase.


๐Ÿง  How the Attack Works

Once a victim pastes a seed phrase or private key into the fake extension interface, itโ€™s game over.

These fake extensions:

โ€ข Monitor inputs over 30 characters (typical of seed phrases)

โ€ข Immediately exfiltrate them to attacker-controlled servers

โ€ข Also log the userโ€™s IP address, likely for geographic targeting


๐Ÿ‡ท๐Ÿ‡บ Whoโ€™s Behind It?

Investigators found Russian-language comments in the code and metadata tied to Russian-speaking actors, although attribution is not conclusive.

The infrastructure behind the scam was impressively organized:

โ€ข Hosting on bulletproof VPS providers

โ€ข Constantly rotating domain names

โ€ข Multiple versions pushed across dozens of wallets and language localizations

This wasnโ€™t a quick smash-and-grab. It was an industrial-scale operation.


๐Ÿงฏ Mozillaโ€™s Response

Mozilla has begun purging these fake extensions, but new ones keep popping up. As of July 2025, many remain live on the Add-ons store, making this a whack-a-mole nightmare for security teams.

Mozilla stated that it is:

โ€ข Using automated scanning tools

โ€ข Relying on user reports

โ€ข Tightening vetting procedures for crypto-related extensions

But clearly, more must be done.


๐Ÿ›ก๏ธ What You Can Do Now

If you use Firefox for crypto-related activity, pause and reassess your security posture. Here's what I recommend:

๐Ÿ” Action Why It Matters

Avoid browser wallet extensions Especially on Firefox, until the dust settles. Use mobile apps or official websites.

Install only from verified sources Check the publisher name and history. Don't trust reviews alone.

Enable 2FA everywhere Adds a critical second layer to access.

Use cold storage for large holdings If itโ€™s not online, it canโ€™t be drained.

Report suspicious extensions Help Mozilla remove threats faster.


๐Ÿงฐ Free Tool to Check for Scam Wallets

At scamhunter.ai, weโ€™re fighting crypto scams head-on. Uppsala Security offers a free tool to:

โ€ข Scan suspicious wallet addresses

โ€ข View scam reports

โ€ข Flag stolen assets

You can try it free twice a day. Just paste in a wallet address and weโ€™ll show you what we know.


๐Ÿšจ Final Thoughts

This latest wave of wallet-cloning extensions on Firefox is a wake-up call for the crypto industry. Browser-based wallets are convenient, but they also open up new attack surfaces.

As always in crypto, convenience must be balanced with paranoia. Double-check everything. Trust no extension blindly. And if youโ€™ve ever typed a seed phrase into an extension, you should migrate your funds now.

The attackers are evolving. So must our defenses.

Stay safe, stay skeptical.


post_like_sub1
post_total_comment_sub0

18 ์กฐํšŒ

0/500 bytes