MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Crypto scam group GreedyBear steals over $1m using fake extensions and malware
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$72,521.001.00%
  • ethereumEthereum(ETH)$2,126.822.46%
  • tetherTether(USDT)$1.000.02%
  • binancecoinBNB(BNB)$655.730.68%
  • rippleXRP(XRP)$1.430.50%
  • usd-coinUSDC(USDC)$1.00-0.01%
  • solanaSolana(SOL)$91.250.44%
  • tronTRON(TRX)$0.2844150.08%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-0.99%
  • dogecoinDogecoin(DOGE)$0.0961493.26%
Blockchain Security

Crypto scam group GreedyBear steals over $1m using fake extensions and malware

Last updated: August 8, 2025 3:00 pm
Published: 7 months ago
Share

A group of cryptocurrency threat actors dubbed “GreedyBear” has stolen over $1 million in what researchers describe as an industrial-scale campaign spanning malicious browser extensions, malware, and scam websites.

GreedyBear has “redefined industrial-scale crypto theft,” according to Koi Security researcher Tuval Admoni, who said the group’s approach blends multiple proven attack methods into one coordinated operation.

While most cybercriminal outfits specialize in a single vector, such as phishing, ransomware, or fake extensions, GreedyBear has pursued all three simultaneously at a large scale.

The findings come just days after blockchain security firm PeckShield reported a sharp rise in crypto crime in July, with bad actors stealing roughly $142 million across 17 major incidents.

Koi Security’s investigation found that GreedyBear’s current campaign has already deployed more than 650 malicious tools targeting cryptocurrency wallet users.

Admoni noted that this marks an escalation from the group’s earlier “Foxy Wallet” campaign, which in July exposed 40 malicious Firefox extensions.

The group uses a technique Koi calls “Extension Hollowing” to bypass marketplace checks and gain user trust.

Operators first publish innocuous-looking Firefox extensions — such as link sanitizers or video downloaders — under new publisher accounts. These are then padded with fake positive reviews before being converted into wallet-impersonating tools targeting MetaMask, TronLink, Exodus, and Rabby Wallet.

Once weaponized, the extensions harvest credentials directly from user input fields and transmit them to GreedyBear’s command-and-control server.

Beyond extensions, researchers found nearly 500 malicious Windows executables tied to the same infrastructure.

These files span multiple malware families, including credential stealers such as LummaStealer, ransomware variants resembling Luca Stealer, and generic trojans likely acting as loaders for other payloads.

Koi Security noted that many of these samples appear in malware distribution pipelines hosted on Russian-language websites that offer cracked, pirated, or “repacked” software. This distribution method not only widens the group’s reach to less security-conscious users but also allows them to seed infections beyond the crypto-native audience.

Researchers also found malware samples that demonstrated modular capabilities, suggesting the operators can update payloads or swap functions without deploying entirely new malware.

Running in parallel with these malware operations, GreedyBear maintains a network of scam websites that impersonate cryptocurrency products and services. These websites are designed to harvest sensitive information from unsuspecting users.

Koi Security found fake landing pages advertising hardware wallets, and bogus wallet-repair services claiming to fix popular devices like Trezor. Other pages were found to be promoting fake digital wallets or crypto utilities, all with professional-grade design.

Unlike traditional phishing sites that mimic exchange login pages, these scams pose as product showcases or support services. Visitors are lured into entering wallet recovery phrases, private keys, payment information, or other sensitive data, which the attackers then exfiltrate for follow-on theft or credit card fraud.

Koi’s investigation found that some of these domains were still active and harvesting data, while others appeared dormant but ready for activation in future campaigns.

Further, Koi found that nearly all domains connected to GreedyBear’s extensions, malware, and scam websites resolve to a single IP address — 185.208.156.66.

This server functions as the operation’s command-and-control hub, managing credential collection, ransomware coordination, and hosting for fraudulent websites. By consolidating operations on one infrastructure, the group is able to track victims, adjust payloads, and distribute stolen data with greater speed and efficiency.

According to Admoni, there were also signs of “AI-generated artifacts” found within the campaign’s code, which makes it “faster and easier than ever for attackers to scale operations, diversify payloads, and evade detection.”

“This isn’t a passing trend — it’s the new normal. As attackers arm themselves with increasingly capable AI, defenders must respond with equally advanced security tools and intelligence,” Admoni said.

Read more on crypto.news

This news is powered by crypto.news crypto.news

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Trust Wallet Opens Claims Process After $7M Chrome Extension Hack – FinanceFeeds
AxonDAO Selects Oracle Cloud Infrastructure to Build and Scale Secure GPU Infrastructure for AI and Life Sciences Workloads
Thinking of Rotating Out of TRX or BNB? Codename:Pepe (AGNT) Could Deliver Better Upside This Quarter
CertiK predicts ‘endless war’ with crypto hackers after $2.5B stolen
Laura AI Agent Presale Live on PinkSale: The First Fully Autonomous AI Trading Agent on Solana

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Mavryk and Fireblocks Power $10B Tokenized Real Estate Push on MultiBank.io
Next Article Ruvi AI (RUVI) Overtakes Bitcoin (BTC) Hype, Analysts Call It Summer’s Top Coin as CoinMarketCap Listing Made Its Token Trending
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d