A Russian Hacking Group Is Using Fake Versions of MetaMask to Steal M in Crypto A Russian Hacking Group Is Using Fake Versions of MetaMask to Steal M in Crypto

A Russian Hacking Group Is Using Fake Versions of MetaMask to Steal $1M in Crypto

In brief

  • Russian hacking group GreedyBear has scaled up its operations and stolen $1 million within the last five weeks.
  • Koi Security reported that the group has “redefined industrial-scale crypto theft,” using 150 weaponized Firefox extensions.
  • This particular ploy involves creating fake versions of widely downloaded crypto wallets such as MetaMask, Exodus, Rabby Wallet and TronLink.

The Russian hacking group GreedyBear has scaled up its operations in recent months, using 150 “weaponized Firefox extensions” to target international and English-speaking victims, according to research from Koi Security.

Publishing the results of its research in a blog, U.S. and Israel-based Koi reported that the group has “redefined industrial-scale crypto theft,” using 150 weaponized Firefox extensions, close to 500 malicious executables and “dozens” of phishing websites to steal over $1 million within the past five weeks.

Speaking to Decrypt, Koi CTO Idan Dardikman said that the Firefox campaign is “by far” its most lucrative attack vector, having “gained them most of the $1 million reported by itself.”

This particular ploy involves creating fake versions of widely downloaded crypto wallets such as MetaMask, Exodus, Rabby Wallet, and TronLink.

GreedyBear operatives use Extension Hollowing to bypass marketplace security measures, initially uploading non-malicious versions of the extensions, before updating the apps with malicious code.

They also post fake reviews of the extensions, giving the false impression of trust and reliability.

But once downloaded, the malicious extensions steal wallet credentials, which in turn are used to steal crypto

Not only has GreedyBear been able to steal $1 million in just over a month using this method, but they have greatly ramped up the scale of their operations, with a previous campaign–active between April and July of this year–involving only 40 extensions.

The group’s other primary attack method involves almost 500 malicious Windows executables, which it has added to Russian websites that distribute pirated or repacked software.

Such executables include credential stealers, ransomware software and trojans, which Koi Security suggests indicates“a broad malware distribution pipeline, capable of shifting tactics as needed.”

The group has also created dozens of phishing websites, which pretend to offer legitimate crypto-related services, such as  digital wallets, hardware devices or wallet repair services.

GreedyBear uses these websites to coax potential victims into entering personal data and wallet credentials, which it then uses to steal funds.

“It is worth mentioning that the Firefox campaign targeted more global/English-speaking victims, while the malicious executables targeted more Russian-speaking victims,” explains Idan Dardikman, speaking to Decrypt.

Despite the variety of attack methods and of targets, Koi also reports that “almost all” GreedyBear attack domains link back to a single IP address: 185.208.156.66.

According to the report, this address functions as a central hub for coordination and collection, enabling GreedyBear hackers “to streamline operations.”

Dardikman saidthat a single IP address “means tight centralized control” rather than a distributed network.

“This suggests organized cybercrime rather than state sponsorship–government operations typically use distributed infrastructure to avoid single points of failure,” he added. “Likely Russian criminal groups operating for profit, not state direction.”

Dardikman said that GreedyBear is likely to continue its operations and offered several tips for avoiding their expanding reach.

“Only install extensions from verified developers with long histories,” he said, adding that users should always avoid pirated software sites.

He also recommended using only official wallet software, and not browser extensions, although he advised moving away from software wallets if you’re a serious long-term investor.

He said, “Use hardware wallets for significant crypto holdings, but only buy from official manufacturer websites–GreedyBear creates fake hardware wallet sites to steal payment info and credentials.”

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.

Source link

Simon Chandler

https://decrypt.co/334384/russia-hackers-greedybear-fake-metamask-1m-crypto

2025-08-10 15:01:00

bitcoin
Bitcoin (BTC) $ 120,284.00 1.26%
ethereum
Ethereum (ETH) $ 4,327.64 2.60%
xrp
XRP (XRP) $ 3.21 0.68%
tether
Tether (USDT) $ 0.999765 0.02%
bnb
BNB (BNB) $ 806.41 0.55%
solana
Solana (SOL) $ 180.18 0.67%
usd-coin
USDC (USDC) $ 0.999784 0.00%
staked-ether
Lido Staked Ether (STETH) $ 4,312.43 2.41%
dogecoin
Dogecoin (DOGE) $ 0.231229 0.57%
tron
TRON (TRX) $ 0.344255 1.13%
cardano
Cardano (ADA) $ 0.794647 0.95%
wrapped-steth
Wrapped stETH (WSTETH) $ 5,227.11 2.52%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 120,091.00 1.19%
hyperliquid
Hyperliquid (HYPE) $ 44.59 0.71%
chainlink
Chainlink (LINK) $ 21.94 2.16%
stellar
Stellar (XLM) $ 0.444181 0.43%
wrapped-beacon-eth
Wrapped Beacon ETH (WBETH) $ 4,639.66 2.36%
sui
Sui (SUI) $ 3.74 3.32%
wrapped-eeth
Wrapped eETH (WEETH) $ 4,631.22 2.23%
bitcoin-cash
Bitcoin Cash (BCH) $ 588.05 2.48%
hedera-hashgraph
Hedera (HBAR) $ 0.253803 2.09%
weth
WETH (WETH) $ 4,319.73 2.45%
ethena-usde
Ethena USDe (USDE) $ 1.00 0.01%
avalanche-2
Avalanche (AVAX) $ 23.73 0.87%
litecoin
Litecoin (LTC) $ 125.10 0.59%
the-open-network
Toncoin (TON) $ 3.39 1.92%
leo-token
LEO Token (LEO) $ 9.00 0.44%
usds
USDS (USDS) $ 0.999009 0.04%
shiba-inu
Shiba Inu (SHIB) $ 0.000013 1.92%
binance-bridged-usdt-bnb-smart-chain
Binance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.999013 0.08%
whitebit
WhiteBIT Coin (WBT) $ 45.41 0.85%
uniswap
Uniswap (UNI) $ 10.91 1.60%
coinbase-wrapped-btc
Coinbase Wrapped BTC (CBBTC) $ 120,165.00 1.12%
polkadot
Polkadot (DOT) $ 3.97 2.23%
crypto-com-chain
Cronos (CRO) $ 0.168069 4.73%
ethena
Ethena (ENA) $ 0.81539 2.94%
ethena-staked-usde
Ethena Staked USDe (SUSDE) $ 1.19 0.09%
bitget-token
Bitget Token (BGB) $ 4.43 0.62%
monero
Monero (XMR) $ 272.64 3.30%
pepe
Pepe (PEPE) $ 0.000012 2.10%
aave
Aave (AAVE) $ 298.85 2.96%
dai
Dai (DAI) $ 1.00 0.02%
bittensor
Bittensor (TAO) $ 374.42 4.10%
ethereum-classic
Ethereum Classic (ETC) $ 22.85 1.53%
mantle
Mantle (MNT) $ 1.00 2.17%
near
NEAR Protocol (NEAR) $ 2.69 2.44%
ondo-finance
Ondo (ONDO) $ 1.01 1.32%
aptos
Aptos (APT) $ 4.69 0.32%
pi-network
Pi Network (PI) $ 0.403597 3.66%
internet-computer
Internet Computer (ICP) $ 5.55 1.88%