Security
Firefox Add-ons Store Hit by Massive Wave of Fake Wallet Extensions

Researchers uncovered a coordinated campaign of over 40 malicious Firefox extensions. These add‑ons mimic trusted crypto wallet tools to steal private keys and seed phrases. Users are at risk. Extensions remain live in Mozilla’s official store. This threat started in April 2025 and continues today.
Contents
The FoxyWallet Campaign
I. What is FoxyWallet?
The campaign is named “FoxyWallet.” Attackers created dozens of fake extensions posing as popular wallets. Targets include MetaMask, Coinbase Wallet, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox.
These clones use the real branding—names, logos, and even legit open‑source code—while hiding malicious logic. The result: extensions behave normally, but also steal sensitive data in the background.
II. How They Trick Users
- Name and logo impersonation
Clone official wallet tools. Same names. Same icons. Users trust them by design. - Fake ratings and reviews
Many extensions show hundreds of 5‑star reviews—more than their actual installs. This creates false legitimacy. - Cloned open‑source code
Code is taken from official wallets. Attackers add data‑stealing logic. The clones work but also exfiltrate data.
Technical Details of the Attack
I. Data exfiltration and tracking
- On install, the extension starts watching for credentials being entered on wallet sites.
- It captures seed phrases, private keys, addresses.
- It silently sends these to attacker‑controlled servers. External IP addresses are included too.
II. Ongoing campaign
- Active since at least April 2025.
- New extensions appeared as recently as last week.
- Mozilla has removed most, but a few still linger on the store.
Who is Behind the Scheme?
So far, clues point to a Russian‑speaking actor:
- Russian‑language comments in the code.
- Metadata in a PDF on a control server.
This is not conclusive, but worth noting.
Scale of the Attack
- Dark Reading reported around 45 extensions at one point.
- Geekflare confirmed over 40 unique forks remain on the store.
- The campaign uses Mozilla’s store trust features—name, reviews, branding, open‑source—against users.
Broader Context and Threat Trend
I. Browser extensions as attack vectors
Socket’s Threat Team recently uncovered that extensions in normal stores are widely used to:
- Redirect users to scams.
- Hijack browsing sessions.
- Inject tracking code.
- Steal OAuth tokens.
II. Similar campaigns
Earlier in 2025:
- “Shell Shockers io” and clones by actor mre1903 infected Firefox and Chrome with gambling‑style popups, affiliate tracking, and OAuth token theft.
- At least eight malicious Firefox extensions used identical tactics to hijack sessions, spy via hidden iframes, and steal tokens .
This shows attackers use multiple tactics and continue evolving.
III. WalletProbe findings
A recent study (April 2025) tested 39 popular wallet extensions. It found 13 attack vectors and 21 strategies. All wallets could be abused to steal assets.
The Risk to Individuals
- Once seed phrases leak, attackers can drain wallets instantly.
- Users may trust extensions from the official store.
- Victims often won’t notice until assets are gone.
- Hackers can track victims by IP and target high‑value wallets.
Risk to Organizations
- Extensions may access internal tools if browsers are used at work.
- A rogue extension can exfiltrate credentials, tokens, session info.
- Attackers can use OAuth or session tokens to escalate deeper.
- Uncontrolled extensions are a threat to enterprise security integrity.
Browser Provider and Security Response
I. Mozilla’s actions
- Most foxeywallet extensions have been removed.
- MyMonero Wallet clone remains under review.
- Mozilla says it uses an “early detection system” to block scam crypto extensions.
II. Industry advice
From Koi Security and Dark Reading:
- Treat extensions like any software—vet them before install.
- Use allow‑lists at work, not block‑lists.
- Monitor installed extensions and changes over time.
Mozilla support suggests:
- Review permissions carefully.
- Check developer identity.
- Look at user reviews and installs count.
Practical Recommendations
- Limit extension installs
Only add tools you need and from trusted sources. - Verify publishers
Check developer name, website, contact info. - Inspect permissions
Avoid extensions requiring broad access to all web pages. - Check reviews manually
Look for signs of fake or repetitive reviews. - Monitor post-install behavior
Watch for sudden popups, redirects, or hidden frames. - Use hardware wallets
Keep seed phrases offline and away from browser processes. - Enterprise controls
Implement allow‑lists, continuous monitoring, and access boundaries. - Stay updated
Remove unused or unwanted add‑ons regularly.
Bitcoin
No Evidence of Hack, Says Bitfinex CTO Amid Ransomware Gang’s Allegations

In the world of cybersecurity, claims of data breaches can cause significant concern and speculation. Recently, a ransomware group named FSOCIETY claimed to have successfully hacked several organizations, including the cryptocurrency exchange Bitfinex. However, Bitfinex’s Chief Technology Officer (CTO), Paolo Ardoino, has dismissed these rumors, stating that a thorough analysis of their systems revealed no evidence of a breach.
According to Ardoino, who is also the CEO of Tether, less than 25% of the email addresses allegedly stolen from Bitfinex’s servers match legitimate users. This casts doubt on the validity of FSOCIETY’s claims regarding the supposed hack.
The ransomware group, styled after the fictional hacking group from the TV show “Mr. Robot,” claimed to have breached several victims, including Rutgers University, consulting firm SBC Global, and a cryptocurrency exchange they referred to as “Coinmoma,” which is likely a misspelling of Coinmama.
Ardoino expressed skepticism about the group’s claims, stating that if they had indeed hacked Bitfinex, they would have demanded a ransom through the exchange’s bug bounty program, customer support channels, emails, or social media accounts. However, Bitfinex received no such requests from FSOCIETY.
Furthermore, Ardoino shared a message from a security researcher suggesting that the real motivation behind the alleged hacks might be to promote FSOCIETY’s ransomware tools, which they reportedly sell access to in exchange for a subscription fee and a commission on stolen profits. Ardoino questioned the group’s need to sell their tools for $299 if they had truly hacked a major exchange like Bitfinex.
It’s worth noting that Bitfinex has previously fallen victim to a significant hack in 2016, resulting in the theft of a substantial amount of Bitcoin. Two individuals, including crypto rapper ‘Razzlekhan,’ pleaded guilty to money laundering charges in connection with that incident.

While the claims made by FSOCIETY have yet to be verified by the alleged victims, Bitfinex’s CTO remains firm in his stance that no breach has occurred. As cybersecurity threats continue to evolve, it is crucial for organizations to remain vigilant and take proactive measures to protect their systems and users’ data.
Exchanges
Smart Contract Hacking Costs Ex-Engineer $12M and His Freedom

A former senior security engineer was sentenced to three years in prison for executing sophisticated hacks against two decentralized cryptocurrency exchanges, stealing over $12 million worth of digital assets.
Shakeeb Ahmed, 34, of New York, pleaded guilty to computer fraud charges related to the July 2022 hacks. He exploited vulnerabilities in the smart contracts governing the exchanges to artificially inflate fees and purchase crypto tokens at manipulated prices.
Damian Williams, the U.S. Attorney for the Southern District of New York, announced the sentencing and first-ever conviction for hacking a blockchain smart contract. “No matter how novel or sophisticated the hack, this office is committed to following the money and bringing hackers to justice,” Williams stated.
The Two Crypto Exchange Hacks In the first hack, Ahmed exploited a pricing flaw in an unnamed decentralized exchange. He inserted fake data to generate around $9 million in inflated fees, which he then withdrew as cryptocurrency. Ahmed later agreed to return most of the funds to avoid prosecution.
Weeks later, Ahmed struck again by hacking Nirvana Finance, a decentralized exchange for the ANA token. He used a flash loan to purchase ANA at an artificially low price through a smart contract exploit. Ahmed then immediately sold the ANA back to Nirvana at the higher market rate, netting $3.6 million – virtually all of Nirvana’s funds.
After the attacks, Ahmed searched online for information about the hacks, potential criminal liability, and how to flee the country to avoid charges.
Sophisticated Money Laundering Techniques To cover his tracks, Ahmed employed advanced crypto money laundering methods. These included swapping tokens, “bridging” funds between blockchains, converting to privacy coin Monero, using overseas exchanges, and leveraging “mixers” like Samourai Whirlpool.
In addition to his prison sentence, Ahmed was ordered to forfeit the $12.3 million in stolen cryptocurrency. He must also pay over $5 million in restitution to the victim exchanges.
Altcoins
P2P NFT Trading Platform Faces Breach: Users Urged to Take Immediate Action

NFT Trader, a peer-to-peer (P2P) trading platform, recently experienced a security breach leading to the unauthorized transfer of significant NFT assets. The attacker, identified as 0x90…8fda, successfully made off with 37 Bored Ape Yacht Club (BAYC), 13 Mutant Ape Yacht Club (MAYC), 4 World of Women, and 6 VeeFriends NFTs, collectively valued at 1,080 ETH (approximately $2.4 million). Users are strongly advised to promptly revoke any authorization granted to the platform.
Initial reports, shared by Chinese crypto news reporter Colin Wu on social media, indicate that the pilfered NFTs were sent to the address 0x909F2159780e64143CF08f32dBBF56Ed19478fda (link to tweet). An on-chain message from the address holder, claiming the role of a “scavenger,” refutes allegations of hacking the P2P trading platform. Instead, they assert rescuing the NFTs with the intention of returning them.
Further information reveals that the alleged real hacker’s address is 0x3dc115307c7b79e9ff0afe4c1a0796c22e366a47b47ed2d82194bcd59bb4bd46.
NFT Trader has acknowledged the security incident and disclosed that the attack targeted old smart contracts. In response, the platform is advising users to remove delegations via Revoke.cash from the following addresses:
- 0xc310e760778ecbca4c65b6c559874757a4c4ece0
- 0x13d8faF4A690f5AE52E2D2C52938d1167057B9af
Despite being relatively unknown among NFT traders, NFT Trader’s website identifies its CEO as John Pak, collaborating with co-founders Mattia Migliore and an individual using the pseudonym “Bruckzr” (link to tweet).
On social media, an NFT collector (@dingalingts) has urged traders to “revoke approval to their contract ASAP” for those who have engaged with NFT Trader previously. The stolen digital assets, which exceed $2 million in value, include 37 BAYC, 13 MAYC, 4 World of Women, and 6 VeeFriends.
-
Altcoins5 years ago
Project Review: Pi Network, a New Scam Project in Town
-
Bitcoin4 years ago
Bitcoin Worth $1.2M Seized From Arrested Indian Hacker
-
Altcoins6 years ago
Review: Play Arcade Games Inside ARK Wallet And Win Some Free Cryptocurrency
-
Blockchain6 years ago
A Full Review: Utopia A New Decentralized P2P Blockchain
-
Bitcoin6 years ago
Another Exit Scam: NovaChain Shuts Down
-
Exchanges6 years ago
Crex24 Will Require KYC Verification
-
Bitcoin6 years ago
John McAfee Has Gone Missing
-
Blockchain6 years ago
Project Review: Dmail Decentralized Blockchain Email