GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.
AI Analysis
Technical Summary
The GhostPoster malware campaign exploited 17 Firefox browser add-ons, collectively downloaded over 50,000 times, to deliver a multi-stage malicious payload. These add-ons were advertised as legitimate utilities such as VPNs, screenshot tools, ad blockers, and unofficial Google Translate versions. The attack vector involved embedding malicious JavaScript code within the add-ons' logo files, which are parsed upon extension load to extract a loader script. This loader contacts attacker-controlled servers (www.liveupdt[.]com and www.dealctr[.]com) to retrieve the main payload, but only with a 10% probability and after waiting 48 hours between attempts, to evade detection. The payload is a custom-encoded toolkit that monetizes victim browsing through affiliate link hijacking (targeting e-commerce platforms like Taobao and JD.com), injection of Google Analytics tracking code for profiling, stripping of security headers (Content-Security-Policy and X-Frame-Options) to expose users to clickjacking and XSS, and injection of hidden iframes to facilitate ad and click fraud. The malware also includes CAPTCHA bypass mechanisms to avoid bot detection, enabling persistent fraudulent activity. Activation delays of over six days post-installation further complicate detection. All affected extensions communicate with the same command-and-control infrastructure, indicating a coordinated campaign by a single threat actor. The malware also opens backdoors for remote code execution, increasing risk of further compromise. The campaign underscores the dangers of supply chain attacks via browser extensions and the challenges in detecting sophisticated, stealthy malware in widely used software components.
Potential Impact
For European organizations, the GhostPoster malware poses several risks. The hijacking of affiliate links and ad fraud can lead to financial losses and reputational damage, especially for businesses relying on online marketing and affiliate programs. The injection of tracking code compromises user privacy and may violate stringent European data protection regulations such as GDPR, exposing organizations to legal penalties. Stripping security headers increases susceptibility to clickjacking and cross-site scripting attacks, potentially leading to further exploitation and data breaches. The backdoor capability enables remote code execution, which can be leveraged for espionage, lateral movement, or deployment of additional malware. The stealthy nature of the malware, including delayed activation and probabilistic payload fetching, complicates detection and remediation efforts. Organizations using Firefox browsers with extensions from unverified sources are particularly vulnerable. Additionally, the campaign's targeting of e-commerce affiliate links suggests potential impact on European online retailers and consumers. Overall, the threat undermines browser security, user privacy, and organizational trust in software supply chains.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy against threats like GhostPoster. First, enforce strict policies restricting installation of browser extensions to those vetted and approved by IT security teams, ideally from trusted sources only. Employ endpoint detection and response (EDR) solutions capable of monitoring browser behavior and detecting anomalous network connections to suspicious domains such as those used by the malware's C2 servers. Use network security tools to block known malicious domains and monitor for unusual traffic patterns indicative of delayed or probabilistic payload fetching. Regularly audit installed browser extensions and remove any that are unnecessary or untrusted. Educate users about the risks of installing extensions from unofficial sources and the importance of timely reporting suspicious browser behavior. Implement Content Security Policy (CSP) headers and other browser security features to mitigate risks from header stripping and iframe injection. Deploy advanced threat detection solutions that can analyze JavaScript behavior and detect steganographic code within assets like logo files. Finally, maintain up-to-date incident response plans to quickly isolate and remediate infected systems, and collaborate with browser vendors to report and remove malicious extensions promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Spain, Italy, Poland
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
Description
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.
AI-Powered Analysis
Technical Analysis
The GhostPoster malware campaign exploited 17 Firefox browser add-ons, collectively downloaded over 50,000 times, to deliver a multi-stage malicious payload. These add-ons were advertised as legitimate utilities such as VPNs, screenshot tools, ad blockers, and unofficial Google Translate versions. The attack vector involved embedding malicious JavaScript code within the add-ons' logo files, which are parsed upon extension load to extract a loader script. This loader contacts attacker-controlled servers (www.liveupdt[.]com and www.dealctr[.]com) to retrieve the main payload, but only with a 10% probability and after waiting 48 hours between attempts, to evade detection. The payload is a custom-encoded toolkit that monetizes victim browsing through affiliate link hijacking (targeting e-commerce platforms like Taobao and JD.com), injection of Google Analytics tracking code for profiling, stripping of security headers (Content-Security-Policy and X-Frame-Options) to expose users to clickjacking and XSS, and injection of hidden iframes to facilitate ad and click fraud. The malware also includes CAPTCHA bypass mechanisms to avoid bot detection, enabling persistent fraudulent activity. Activation delays of over six days post-installation further complicate detection. All affected extensions communicate with the same command-and-control infrastructure, indicating a coordinated campaign by a single threat actor. The malware also opens backdoors for remote code execution, increasing risk of further compromise. The campaign underscores the dangers of supply chain attacks via browser extensions and the challenges in detecting sophisticated, stealthy malware in widely used software components.
Potential Impact
For European organizations, the GhostPoster malware poses several risks. The hijacking of affiliate links and ad fraud can lead to financial losses and reputational damage, especially for businesses relying on online marketing and affiliate programs. The injection of tracking code compromises user privacy and may violate stringent European data protection regulations such as GDPR, exposing organizations to legal penalties. Stripping security headers increases susceptibility to clickjacking and cross-site scripting attacks, potentially leading to further exploitation and data breaches. The backdoor capability enables remote code execution, which can be leveraged for espionage, lateral movement, or deployment of additional malware. The stealthy nature of the malware, including delayed activation and probabilistic payload fetching, complicates detection and remediation efforts. Organizations using Firefox browsers with extensions from unverified sources are particularly vulnerable. Additionally, the campaign's targeting of e-commerce affiliate links suggests potential impact on European online retailers and consumers. Overall, the threat undermines browser security, user privacy, and organizational trust in software supply chains.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy against threats like GhostPoster. First, enforce strict policies restricting installation of browser extensions to those vetted and approved by IT security teams, ideally from trusted sources only. Employ endpoint detection and response (EDR) solutions capable of monitoring browser behavior and detecting anomalous network connections to suspicious domains such as those used by the malware's C2 servers. Use network security tools to block known malicious domains and monitor for unusual traffic patterns indicative of delayed or probabilistic payload fetching. Regularly audit installed browser extensions and remove any that are unnecessary or untrusted. Educate users about the risks of installing extensions from unofficial sources and the importance of timely reporting suspicious browser behavior. Implement Content Security Policy (CSP) headers and other browser security features to mitigate risks from header stripping and iframe injection. Deploy advanced threat detection solutions that can analyze JavaScript behavior and detect steganographic code within assets like logo files. Finally, maintain up-to-date incident response plans to quickly isolate and remediate infected systems, and collaborate with browser vendors to report and remove malicious extensions promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/ghostposter-malware-found-in-17-firefox.html","fetched":true,"fetchedAt":"2025-12-17T10:43:11.950Z","wordCount":1207}
Threat ID: 6942894276794366d0b4e39a
Added to database: 12/17/2025, 10:43:14 AM
Last enriched: 12/17/2025, 10:43:28 AM
Last updated: 12/18/2025, 1:31:08 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry
MediumThreatFox IOCs for 2025-12-17
MediumParked Domains Become Weapons with Direct Search Advertising
MediumNew ClickFix Attack Uses Fake Browser Fix to Install DarkGate Malware on Your Device
MediumGachiLoader: Defeating Node.js Malware with API Tracing
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.