Sunday, March 29, 2026
Catatonic Times
No Result
View All Result
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert
No Result
View All Result
Catatonic Times
No Result
View All Result

A Russian Hacking Group Is Using Fake Versions of MetaMask to Steal $1M in Crypto

by Catatonic Times
August 10, 2025
in Web3
Reading Time: 5 mins read
0 0
A A
0
Home Web3
Share on FacebookShare on Twitter



Briefly

Russian hacking group GreedyBear has scaled up its operations and stolen $1 million inside the final 5 weeks.
Koi Safety reported that the group has “redefined industrial-scale crypto theft,” utilizing 150 weaponized Firefox extensions.
This specific ploy includes creating faux variations of extensively downloaded crypto wallets reminiscent of MetaMask, Exodus, Rabby Pockets and TronLink.

The Russian hacking group GreedyBear has scaled up its operations in latest months, utilizing 150 “weaponized Firefox extensions” to focus on worldwide and English-speaking victims, in accordance with analysis from Koi Safety.

Publishing the outcomes of its analysis in a weblog, U.S. and Israel-based Koi reported that the group has “redefined industrial-scale crypto theft,” utilizing 150 weaponized Firefox extensions, near 500 malicious executables and “dozens” of phishing web sites to steal over $1 million inside the previous 5 weeks.

Chatting with Decrypt, Koi CTO Idan Dardikman stated that the Firefox marketing campaign is “by far” its most profitable assault vector, having “gained them a lot of the $1 million reported by itself.”

This specific ploy includes creating faux variations of extensively downloaded crypto wallets reminiscent of MetaMask, Exodus, Rabby Pockets, and TronLink.



GreedyBear operatives use Extension Hollowing to bypass market safety measures, initially importing non-malicious variations of the extensions, earlier than updating the apps with malicious code.

In addition they put up faux evaluations of the extensions, giving the misunderstanding of belief and reliability.

However as soon as downloaded, the malicious extensions steal pockets credentials, which in flip are used to steal crypto

Not solely has GreedyBear been in a position to steal $1 million in simply over a month utilizing this technique, however they’ve significantly ramped up the size of their operations, with a earlier marketing campaign–energetic between April and July of this yr–involving solely 40 extensions.

The group’s different major assault technique includes nearly 500 malicious Home windows executables, which it has added to Russian web sites that distribute pirated or repacked software program.

Such executables embrace credential stealers, ransomware software program and trojans, which Koi Safety suggests signifies“a broad malware distribution pipeline, able to shifting techniques as wanted.”

The group has additionally created dozens of phishing web sites, which faux to supply reputable crypto-related companies, reminiscent of  digital wallets, {hardware} gadgets or pockets restore companies.

GreedyBear makes use of these web sites to coax potential victims into coming into private information and pockets credentials, which it then makes use of to steal funds.

“It’s value mentioning that the Firefox marketing campaign focused extra international/English-speaking victims, whereas the malicious executables focused extra Russian-speaking victims,” explains Idan Dardikman, chatting with Decrypt.

Regardless of the number of assault strategies and of targets, Koi additionally studies that “nearly all” GreedyBear assault domains hyperlink again to a single IP tackle: 185.208.156.66.

In accordance with the report, this tackle capabilities as a central hub for coordination and assortment, enabling GreedyBear hackers “to streamline operations.”

Dardikman saidthat a single IP tackle “means tight centralized management” slightly than a distributed community.

“This means organized cybercrime slightly than state sponsorship–authorities operations sometimes use distributed infrastructure to keep away from single factors of failure,” he added. “Probably Russian legal teams working for revenue, not state course.”

Dardikman stated that GreedyBear is more likely to proceed its operations and provided a number of suggestions for avoiding their increasing attain.

“Solely set up extensions from verified builders with lengthy histories,” he stated, including that customers ought to all the time keep away from pirated software program websites.

He additionally beneficial utilizing solely official pockets software program, and never browser extensions, though he suggested shifting away from software program wallets in the event you’re a critical long-term investor.

He stated, “Use {hardware} wallets for important crypto holdings, however solely purchase from official producer web sites–GreedyBear creates faux {hardware} pockets websites to steal cost information and credentials.”

Each day Debrief E-newsletter

Begin every single day with the highest information tales proper now, plus authentic options, a podcast, movies and extra.



Source link

Tags: cryptofakeGroupHackingMetaMaskRussianStealVersions
Previous Post

Fed’s Bowman Pushes for Three Rate Cuts by Year-End

Next Post

How Bitcoin Hyper Aims to Solve Bitcoin’s Performance Problems

Related Posts

Why GameStop Put 5 Million in Bitcoin Into a Covered Call Options Strategy
Web3

Why GameStop Put $315 Million in Bitcoin Into a Covered Call Options Strategy

March 28, 2026
Anthropic’s ‘Most Capable’ AI Model Claude Mythos Leaks, Deemed Major Cybersecurity Threat
Web3

Anthropic’s ‘Most Capable’ AI Model Claude Mythos Leaks, Deemed Major Cybersecurity Threat

March 27, 2026
Retail Investors Growing Exposed to Bitcoin Giant Strategy’s STRC Over MSTR, Says CEO
Web3

Retail Investors Growing Exposed to Bitcoin Giant Strategy’s STRC Over MSTR, Says CEO

March 26, 2026
Playnance G Coin shifts from breakout launch to utility test
Web3

Playnance G Coin shifts from breakout launch to utility test

March 27, 2026
Hackers sneak crypto wallet-stealing code into a popular AI tool that runs every time
Web3

Hackers sneak crypto wallet-stealing code into a popular AI tool that runs every time

March 28, 2026
CoinShares Files for Bitcoin Volatility ETF Suite, Targeting BTC Price Swings
Web3

CoinShares Files for Bitcoin Volatility ETF Suite, Targeting BTC Price Swings

March 25, 2026
Next Post
How Bitcoin Hyper Aims to Solve Bitcoin’s Performance Problems

How Bitcoin Hyper Aims to Solve Bitcoin’s Performance Problems

From Gold To Bitcoin: Saylor’s ‘Indiana Jones’ Moment

From Gold To Bitcoin: Saylor’s 'Indiana Jones' Moment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Catatonic Times

Stay ahead in the cryptocurrency world with Catatonic Times. Get real-time updates, expert analyses, and in-depth blockchain news tailored for investors, enthusiasts, and innovators.

Categories

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Web3

Latest Updates

  • Is It a Safe and Legit Crypto Exchange?
  • The next Bitcoin shock could be where Wall Street finally loses faith and starts selling
  • Kraken’s Tokenized Equities Platform Lists VCXx Offering Exposure to SpaceX, OpenAI, Anthropic and More – News Bytes Bitcoin News
  • About Us
  • Advertise with Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2024 Catatonic Times.
Catatonic Times is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Crypto Updates
  • Bitcoin
  • Ethereum
  • Altcoin
  • Blockchain
  • NFT
  • Regulations
  • Analysis
  • Web3
  • More
    • Metaverse
    • Crypto Exchanges
    • DeFi
    • Scam Alert

Copyright © 2024 Catatonic Times.
Catatonic Times is not responsible for the content of external sites.