> Back to All Posts

GreedyBear Steals $1M in Crypto via Browser Extensions

GreedyBear

A new cybercrime operation called GreedyBear has looted over $1 million in cryptocurrency through an elaborate scheme involving malicious browser extensions, cracked software, and deceptive crypto-themed websites. According to cybersecurity researchers at Lookout, this campaign represents one of the most coordinated and multifaceted threats targeting digital asset holders in recent months.

Fake Wallet Extensions Flood Browser Stores

GreedyBear’s primary weapon is a wave of over 150 fake browser extensions uploaded to the Mozilla Firefox Add-ons store. These extensions impersonate popular crypto wallets such as MetaMask, Rabby, TronLink, and Exodus. At least one fake extension also managed to slip past Google Chrome’s vetting process.

The attackers used a clever tactic known as “extension hollowing.” Initially, the extensions appeared harmless and even featured fake positive reviews to establish credibility. Once approved, malicious code was silently added in updates, allowing the extensions to intercept and exfiltrate users’ wallet credentials.

Coordinated Infrastructure Links Multiple Attack Vectors

What sets GreedyBear apart is its use of three distinct attack vectors that all feed into the same infrastructure:

  • Fake extensions on Firefox and Chrome
  • Malicious executables distributed via cracked software sites
  • Scam websites pretending to offer wallet repair or crypto services

All channels direct victims to the same command-and-control server (IP: 185.208.156.66), tying the campaign’s components together and confirming its centralized coordination.

AI-Enhanced Cybercrime at Scale

Investigators also suspect that artificial intelligence tools may have played a role in the development and deployment of the campaign. The scale and speed at which the malicious extensions were created suggest automation, likely assisted by GenAI technologies.

This is a full-fledged, multi-platform operation optimized for reach and speed.

How to Stay Safe

Crypto users should remain cautious and follow basic hygiene practices to avoid falling victim to similar attacks:

  • Avoid installing unfamiliar browser extensions, even if they appear well-rated.
  • Never download cracked or pirated software, as it is often bundled with malware.
  • Use hardware wallets and secure backups instead of browser-based wallets alone.
  • Regularly review extension permissions and uninstall anything unnecessary.
  • Stay alert to fake websites offering wallet fixes or crypto utilities.

Final Thoughts

The GreedyBear campaign demonstrates how cybercriminals are evolving, leveraging browser extension ecosystems, fake software tools, and possibly AI to steal cryptocurrency at scale. As attacks grow more sophisticated, crypto users must remain vigilant, use secure tools, and question anything that seems too convenient or well-reviewed to be true.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.