Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

0
Medium
Published: Wed Dec 17 2025 (12/17/2025, 08:14:00 UTC)
Source: The Hacker News

Description

A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.

AI-Powered Analysis

AILast updated: 12/17/2025, 10:43:28 UTC

Technical Analysis

The GhostPoster malware campaign exploited 17 Firefox browser add-ons, collectively downloaded over 50,000 times, to deliver a multi-stage malicious payload. These add-ons were advertised as legitimate utilities such as VPNs, screenshot tools, ad blockers, and unofficial Google Translate versions. The attack vector involved embedding malicious JavaScript code within the add-ons' logo files, which are parsed upon extension load to extract a loader script. This loader contacts attacker-controlled servers (www.liveupdt[.]com and www.dealctr[.]com) to retrieve the main payload, but only with a 10% probability and after waiting 48 hours between attempts, to evade detection. The payload is a custom-encoded toolkit that monetizes victim browsing through affiliate link hijacking (targeting e-commerce platforms like Taobao and JD.com), injection of Google Analytics tracking code for profiling, stripping of security headers (Content-Security-Policy and X-Frame-Options) to expose users to clickjacking and XSS, and injection of hidden iframes to facilitate ad and click fraud. The malware also includes CAPTCHA bypass mechanisms to avoid bot detection, enabling persistent fraudulent activity. Activation delays of over six days post-installation further complicate detection. All affected extensions communicate with the same command-and-control infrastructure, indicating a coordinated campaign by a single threat actor. The malware also opens backdoors for remote code execution, increasing risk of further compromise. The campaign underscores the dangers of supply chain attacks via browser extensions and the challenges in detecting sophisticated, stealthy malware in widely used software components.

Potential Impact

For European organizations, the GhostPoster malware poses several risks. The hijacking of affiliate links and ad fraud can lead to financial losses and reputational damage, especially for businesses relying on online marketing and affiliate programs. The injection of tracking code compromises user privacy and may violate stringent European data protection regulations such as GDPR, exposing organizations to legal penalties. Stripping security headers increases susceptibility to clickjacking and cross-site scripting attacks, potentially leading to further exploitation and data breaches. The backdoor capability enables remote code execution, which can be leveraged for espionage, lateral movement, or deployment of additional malware. The stealthy nature of the malware, including delayed activation and probabilistic payload fetching, complicates detection and remediation efforts. Organizations using Firefox browsers with extensions from unverified sources are particularly vulnerable. Additionally, the campaign's targeting of e-commerce affiliate links suggests potential impact on European online retailers and consumers. Overall, the threat undermines browser security, user privacy, and organizational trust in software supply chains.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy against threats like GhostPoster. First, enforce strict policies restricting installation of browser extensions to those vetted and approved by IT security teams, ideally from trusted sources only. Employ endpoint detection and response (EDR) solutions capable of monitoring browser behavior and detecting anomalous network connections to suspicious domains such as those used by the malware's C2 servers. Use network security tools to block known malicious domains and monitor for unusual traffic patterns indicative of delayed or probabilistic payload fetching. Regularly audit installed browser extensions and remove any that are unnecessary or untrusted. Educate users about the risks of installing extensions from unofficial sources and the importance of timely reporting suspicious browser behavior. Implement Content Security Policy (CSP) headers and other browser security features to mitigate risks from header stripping and iframe injection. Deploy advanced threat detection solutions that can analyze JavaScript behavior and detect steganographic code within assets like logo files. Finally, maintain up-to-date incident response plans to quickly isolate and remediate infected systems, and collaborate with browser vendors to report and remove malicious extensions promptly.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/ghostposter-malware-found-in-17-firefox.html","fetched":true,"fetchedAt":"2025-12-17T10:43:11.950Z","wordCount":1207}

Threat ID: 6942894276794366d0b4e39a

Added to database: 12/17/2025, 10:43:14 AM

Last enriched: 12/17/2025, 10:43:28 AM

Last updated: 12/18/2025, 1:31:08 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats