News
  • Elena R
    author-profile

    Elena R right arrow

    Author

    Elena is an expert in technical analysis and risk management in cryptocurrency market. She has 10+year experience in writing - accordingly she is avid journalists with a passion towards researching new insights coming into crypto erena.

    • author twitter

  • Reviewed by: Qadir AK

    author profile

    Qadir AK right arrow

    Reviewed

    Qadir Ak is the founder of Coinpedia. He has over a decade of experience writing about technology and has been covering the blockchain and cryptocurrency space since 2010. He has also interviewed a few prominent experts within the cryptocurrency space.

    • author facebook
    • author twitter
    • author linkedin
  • 2 minutes read

Chrome And Firefox Users Targeted in Coordinated Crypto Credential Attacks

Story Highlights
  • 45 Malicious Firefox Extensions Exposed: Fake crypto wallet extensions steal user credentials by mimicking trusted platforms.

  • Koi Security Warns of Ongoing Threats: Attackers use cloned open-source code and fake branding; users urged to install verified add-ons only.

Popular web browsers Google Chrome and Mozilla Firefox are facing serious security threats. While Chrome is being targeted through a dangerous zero-day vulnerability, Firefox users are under attack from a slew of harmful browser extensions.

On July 1, cybersecurity experts uncovered a malicious campaign involving 45 fake Firefox extensions designed to steal cryptocurrency wallet details from unsuspecting users.

Malicious Firefox Extensions Mimicking Crypto Wallets

The 45 malicious Firefox extensions impersonate legitimate crypto wallet tools from widely used platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox. A security researcher at Koi Security, Yuval Ronen, reported on Wednesday that these extensions steal users’ wallet secrets and credentials. 

The linkage to discover the fake extensions was made through a meticulous effort to discover shared TTPs and infrastructure. This campaign has been active since April 2025 and is still evolving to discover further harmful activities in the browser.

How Was This done

  • The first step in the destructive move was to gain trust through ratings, reviews, branding, and functionality, which makes the extension appear widely adopted and well reviewed. 
  • After gaining trust, they used identical names and logos to impersonate the real services with visual similarities to deceive the users. 
  • In cases of open source, extensions cloned the real codebase and inserted their own malicious logic, creating extensions that behaved as expected by secretly stealing personal data. 

“The extensions extract wallet credentials directly from the targeted websites and exfiltrate them to a remote server controlled by the attacker. During initialization, they also transmit the victim’s external IP address, likely for tracking or targeting purposes,” said Koi Security. 

Surge of Crypto Hacks in 2025

In May 2025, Coinbase Global announced that hackers obtained personal information, putting more than 70,000 customers at risk of attacks and extortion. Many global agencies, such as OFAC and FATF, have addressed various issues related to crypto hacks; however, despite the growing awareness, millions of individuals still fall victim to these crypto kidnappings.  

Risk Mitigation Steps Recommendations by Koi Security 

  • Install extensions only from verified publishers
  • Treat browser extensions as full software assets
  • Use an extension that allows and restricts installation to validated extensions only
  • Timely monitoring to detect ownership transfers and other signs of compromise over time. 

To defend against the employees who unknowingly downloaded the malicious extensions for Firefox, these steps are to be followed, as recommended by Koi Security researcher, Ronen.

Never Miss a Beat in the Crypto World!

Stay ahead with breaking news, expert analysis, and real-time updates on the latest trends in Bitcoin, altcoins, DeFi, NFTs, and more.

FAQs

How can I protect my crypto wallet from browser hacks?

Use hardware wallets, avoid browser-based storage, and install wallet tools only from official or verified sources.

What are the best ways to secure crypto wallets in 2025?

Enable 2FA, use cold storage, avoid public Wi-Fi, monitor wallet activity, and beware of phishing and fake extensions.

Show More

Related Articles

Back to top button