Skip to main content

GreedyBear Scam: 150 Fake Crypto Wallet Extensions Found on Firefox Marketplace

Medium
Published: Fri Aug 08 2025 (08/08/2025, 11:36:21 UTC)
Source: Reddit InfoSec News

Description

GreedyBear Scam: 150 Fake Crypto Wallet Extensions Found on Firefox Marketplace Source: https://hackread.com/greedybear-fake-crypto-wallet-extensions-firefox-marketplace/

AI-Powered Analysis

AILast updated: 08/08/2025, 11:48:04 UTC

Technical Analysis

The GreedyBear Scam involves the discovery of approximately 150 fake cryptocurrency wallet extensions on the Firefox Marketplace. These malicious browser extensions impersonate legitimate crypto wallets to deceive users into installing them. Once installed, these extensions can perform phishing attacks by capturing sensitive information such as private keys, seed phrases, or login credentials related to users' cryptocurrency accounts. The scam leverages the trust users place in browser marketplaces and the growing popularity of crypto wallets to propagate at scale. Although specific technical details about the extensions' internal workings are not provided, the primary attack vector is social engineering combined with malicious code embedded within the extensions. The extensions likely request permissions that enable them to intercept user inputs or redirect users to phishing sites. The threat is categorized as phishing, indicating its primary goal is to steal confidential information rather than exploit software vulnerabilities. No known exploits in the wild have been reported yet, but the presence of a large number of fake extensions on a major browser marketplace indicates a significant risk of widespread user compromise, especially among cryptocurrency users who rely on browser extensions for wallet management.

Potential Impact

For European organizations, the impact of the GreedyBear Scam can be multifaceted. Individual employees using compromised crypto wallet extensions may suffer financial losses, which can indirectly affect organizational security posture if corporate funds or assets are involved. Organizations with employees engaged in cryptocurrency transactions or holding crypto assets are at risk of credential theft and subsequent unauthorized access to corporate or personal wallets. Additionally, if attackers gain access to corporate cryptocurrency wallets, this could lead to direct financial theft and reputational damage. The scam also undermines trust in browser marketplaces and crypto wallet extensions, potentially affecting organizations involved in blockchain, fintech, or cryptocurrency sectors. Furthermore, phishing attacks can serve as entry points for broader cyber intrusions if attackers leverage stolen credentials to escalate privileges or deploy malware within corporate networks. The medium severity rating reflects the significant potential for financial and data loss, although exploitation requires user interaction and installation of malicious extensions.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic advice: 1) Enforce strict browser extension policies via endpoint management solutions to whitelist only verified and necessary extensions, blocking all others. 2) Educate employees specifically about the risks of installing crypto wallet extensions from unverified sources, emphasizing verification of publisher identity and reviews. 3) Monitor network traffic for suspicious activity indicative of phishing or data exfiltration related to browser extensions. 4) Encourage the use of hardware wallets or official desktop/mobile wallet applications over browser extensions for managing cryptocurrency assets. 5) Collaborate with IT security teams to regularly audit installed browser extensions across corporate devices and promptly remove any unapproved or suspicious ones. 6) Stay updated with threat intelligence feeds and browser marketplace announcements to quickly identify and respond to newly discovered malicious extensions. 7) Implement multi-factor authentication (MFA) on all cryptocurrency accounts to reduce the impact of credential theft. 8) Consider deploying browser security solutions that can detect and block phishing attempts and malicious extension behaviors in real-time.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
2
Discussion Level
minimal
Content Source
reddit_link_post
Domain
hackread.com
Newsworthiness Assessment
{"score":27.200000000000003,"reasons":["external_link","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":[],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 6895e3e2ad5a09ad0002fcbb

Added to database: 8/8/2025, 11:47:46 AM

Last enriched: 8/8/2025, 11:48:04 AM

Last updated: 8/8/2025, 1:00:33 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats