firefox extensions stealing crypto

Over 40 malicious Firefox extensions have been stealing crypto wallets since April 2025 by impersonating trusted names like Coinbase, MetaMask, and Trust Wallet. These fake extensions look identical to the real ones, complete with bogus 5-star reviews. They work normally at first, then silently extract wallet keys and seed phrases in real time. Mozilla’s automated detection system plays catch-up, but attackers keep adapting their tactics. The digital heist continues evolving.

malicious firefox extensions stealing crypto

How naive can crypto holders be? Over 40 malicious Firefox extensions have been quietly draining wallets since April 2025, and many users probably installed them willingly.

These aren’t some obscure scam tools hiding in dark corners of the internet. They’re fake versions of trusted names like Coinbase, MetaMask, Trust Wallet, and Phantom.

The attackers aren’t particularly creative, but they’re effective. They clone legitimate open-source wallet extensions, inject malicious code, then slap on fake 5-star reviews to boost credibility.

Hundreds of glowing reviews, all fabricated. The extensions look identical to the real thing, complete with matching logos and names. Most users probably can’t tell the difference.

What makes this particularly brutal is how these extensions operate. They don’t immediately reveal their true nature. Instead, they function normally at first, lulling users into a false sense of security.

Meanwhile, they’re silently extracting wallet keys, seed phrases, and credentials in real time. Every sensitive piece of information gets transmitted to remote servers controlled by the attackers.

The scope is impressive, in a disturbing way. Chrome and Firefox users are both targets, but Firefox has seen a particularly large cluster of fake extensions.

The campaign focuses on widely-adopted wallets like Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox. Smart strategy, really. Why target obscure wallets when you can go after the popular ones?

Even IP addresses get captured and transmitted during extension initialization. The attackers want to track their victims, possibly for future targeting.

Nothing says “thorough theft” like collecting location data alongside stolen crypto credentials.

Mozilla finally caught on and introduced an automated detection system for wallet extensions. The system generates risk profiles and alerts human reviewers when submissions exceed danger thresholds.

Malicious extensions get blocked immediately once discovered through this process.

But here’s the thing about automated systems, they’re reactive, not proactive. The campaign continues to evolve, and attackers adapt. Russian language comments in the source code suggest the threat actors are Russian-speaking, adding another layer to this international crypto heist. This threat landscape mirrors the broader crisis facing the crypto industry, where over 70,000 customers were at risk following Coinbase Global’s personal information breach in May 2025.

Firefox users are fundamentally playing a game of digital whack-a-mole, where the stakes are their entire crypto portfolios.

You May Also Like

Crypto Chaos: BitoPro’s $11.5M Hack Sparks Transparency Debate Despite Unaffected Withdrawals

$11.5M vanished from BitoPro while they played pretend. See how a crypto detective exposed their 25-day charade of silence.

How the U.S. Is Crippling a $4 Billion Crypto Laundering Empire Tied to North Korea

U.S. authorities ditch the rulebook to demolish North Korea’s $4B crypto empire. Their new strategy makes nuclear funding look painfully vulnerable.

North Korea’s Cyber Warriors Amass Over $1B in Bitcoin: The Lazarus Phenomenon

North Korea’s elite hackers didn’t just steal billions in Bitcoin – they revolutionized digital warfare while funding nuclear missiles. Kim’s pirates changed everything.

Crypto’s $2.1 Billion Nightmare: How Private Keys and Front End Exploits Are Betraying Users

Hackers ransacked $2.1B in crypto through private keys and front-end attacks. State actors lurk behind 80% of history’s biggest digital heist.