Mozilla Removes 150+ Crypto-Stealing Firefox Extensions in GreedyBear Scam

Malicious Firefox extensions, disguised as legitimate crypto wallet tools, have stolen millions by intercepting transactions and harvesting keys, with over 150 in the "GreedyBear" campaign. Mozilla removed them, but experts urge better vetting and user vigilance. Proactive measures are essential to combat evolving browser-based threats.
Mozilla Removes 150+ Crypto-Stealing Firefox Extensions in GreedyBear Scam
Written by John Marshall

In the ever-evolving world of cybersecurity threats, Firefox users are facing a sophisticated assault from malicious browser extensions that have siphoned off millions in cryptocurrency. According to a recent report from TechRadar, hundreds of these rogue add-ons, disguised as legitimate tools, have infiltrated Mozilla’s ecosystem, targeting crypto wallets with alarming precision. These extensions often mimic popular wallet interfaces, tricking users into granting access that leads to outright theft.

The scale of the operation is staggering, with attackers employing a mix of fake software and phishing tactics to compromise user data. Industry experts note that this isn’t an isolated incident but part of a broader pattern of browser-based vulnerabilities exploiting the trust users place in official add-on stores.

The Mechanics of Deception and Theft

Delving deeper, these malicious extensions operate by injecting code that intercepts wallet transactions or harvests private keys. As detailed in an analysis by The Hacker News, over 40 such extensions were recently uncovered, impersonating well-known crypto wallets like MetaMask or Ledger. Once installed, they exfiltrate sensitive information to remote servers controlled by cybercriminals, enabling the draining of funds in real-time.

The financial toll has been immense, with estimates suggesting losses exceeding $1 million from a single campaign dubbed “GreedyBear.” This group, as reported by BleepingComputer, flooded Mozilla’s add-on store with 150 deceptive extensions, blending seamlessly among genuine offerings to evade initial detection.

Mozilla’s Response and Systemic Challenges

Mozilla has responded swiftly, removing the offending add-ons and issuing warnings to users, but the incident highlights ongoing challenges in vetting third-party submissions. In a statement echoed across tech publications, the company emphasized the need for enhanced review processes, including AI-driven anomaly detection to flag suspicious code patterns before they reach users.

However, critics argue that reactive measures fall short in an era where cybercriminals iterate rapidly. Historical precedents, such as the 2020 removal of nearly 200 dodgy add-ons documented by TechRadar in an earlier piece, underscore a recurring vulnerability in open ecosystems like Firefox’s.

Implications for Crypto Security and User Vigilance

For industry insiders, this wave of attacks signals a shift toward more industrialized cybercrime, where extensions serve as low-effort vectors for high-reward theft. The “GreedyBear” operation, further explored in a report from It’s FOSS News, combined these extensions with phishing sites to amplify reach, stealing over $1 million by bypassing multi-factor authentication in some cases.

Businesses reliant on crypto assets must now prioritize employee training and extension audits, as browser add-ons increasingly represent an expanded attack surface. Recommendations include verifying add-on developers through independent reviews and opting for hardware wallets that minimize software dependencies.

Broader Industry Lessons and Future Safeguards

Looking ahead, this scandal could prompt regulatory scrutiny on browser vendors, pushing for standardized security protocols across platforms like Chrome and Edge, which have faced similar issues. As TechRadar has noted in related coverage, malicious extensions in those browsers have been downloaded millions of times, often turning legitimate tools rogue over time.

Ultimately, users and enterprises alike should adopt a zero-trust approach to browser extensions, regularly scanning for anomalies and limiting installations to essentials. With cyber threats evolving, proactive vigilance remains the strongest defense against these insidious digital heists.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us