Bitcoin

Your Crypto Wallet Could Vanish Thanks to a Chrome Extension—And You’d Never Know

As you may already know, you can visit websites with web browser software, such as Chrome or Firefox. Now, inside this software, browser extensions are small additional modules that offer your browser additional features, such as blocking advertisements, save passwords or manage your crypto funds with a practical wallet. Metamask is, probably, the extension of the most popular cryptographic browser, but there are many others linked to industry; From safety features to trading features.

The browser extensions can do almost everything, and they offer the additional advantage of doing so without having to abandon our web browser. In April 2025, the Chrome web store Offers approximately 155,419 extensions of all types. Other browsers such as Firefox, Edge and Safari also have their own extension stores, each with variable quantities; And some independent developers and teams also offer their own extensions. They are practical and easy to use.

But they can have a high price.

General risks

Anyone can build a new extension and request the list in official stores or distribute it themselves. This is how cybercriminals find their victims. Extensions with hidden malware has been used to steal cryptocurrencies, hijacking social media accounts and user spies. Malventy developers often disguise these tools as useful complementary modules, which makes them difficult to spot before causing damage.

Even legitimate extensions have extensive authorizations. They can do things like changing all websites, control their interface or inject any code. With such intrusive authorizations granted to all extensions, each part is, by design, spy software, the vast majority of them being well -intentioned spy software. If it is malicious, an extension could record strikes to steal passwords, inject ads or even exchange cryptocurrency walletiemates during transactions.

The attackers also distribute false versions of popular extensions (there are many fake metamask versions, for example), encouraging users to install software that silently exfiltrates data or funds. Even legitimate extensions can become dangerous if they are sold to a new owner who injects harmful code.

While official extension stores are trying to filter threats, bad players always find ways. The attackers have also spread malicious additional modules outside these stores, by bringing them together with hacked content or phishing campaigns. In bad hands, an extension is not only a tool – it is a direct gateway to theft of financial and personal information.

Some malicious extensions

In 2023 only, numerous extensions of malicious chrome were discovered by the cybersecurity company Kaspersky laboratoryaffecting millions of users. One of the most notorious was Rilide, who targeted cryptocurrency holders by monitoring their online activity and stealing portfolio references. He even bypassed two -factors authentication by injecting scripts that modified the details of the transaction, by redirecting the funds to hackers.

This extension was spread by misleading means, including false blockchain game installers, phishing emails (false) and even a deceptive PowerPoint file. Another major threat was the chromeloader, which installed persistent advertising software by encouraging users to download hacked content disguised as games and popular multimedia files. The elimination was difficult because it has automatically resettled after each restart of the system.

Macheal rilide Extension being promoted under the cover of a blockchain game. Kaspersky imageMacheal rilide Extension being promoted under the cover of a blockchain game. Kaspersky image

Other malicious extensions have focused on theft of online accounts. False fake chatgpt plugins like “Chatgpt for Google” and “Quick access to GPT cat” have diverted Facebook commercial accounts by capturing session cookies. The attackers used compromise accounts to promote their malware, ensuring continuous infections. Meanwhile, Roblox users were targeted by extensions like Searchblox, Rofinder and Rotacker, who stole active in the game.

Overall, more than 87 million malicious extensions have been recorded. Many have disguised themselves as legitimate tools, such as PDF converters and advertising blockers, deceiving without distrust users. Despite user complaints, some of them stayed in the Chrome online store for months until safety researchers and online communities have forced Google to take measures. This highlights the risks of relying only on the Chrome Moderation of the Web store for safety.

Cyberhaven case

People often believe that if they are digitally stolen, it is probably their fault not to take enough preventive measures or fall for the deceptions of cybercriminals. This is not always the case, however. Sometimes you may have downloaded a perfectly legitimate browser extension, then discover a few months later that the company behind this tool was attacked, and their extension was falsified to steal data and funds. This is what happened to users of Switchyomega by Cyberhavenand also at around 2.6 million users of the 32 other browser extensions available on Chrome.

List of extensions compromised during the same malicious campaign against Cyberhaven. Slowmist imageList of extensions compromised during the same malicious campaign against Cyberhaven. Slowmist image

Cyberhaven was the victim of an attack when of his employees was deceived by a phishing email. The message falsely claimed that the company's browser extension had violated Google's policies and required urgent action. The employee unconsciously granted access to an OAUTH application controlled by the attackers, which allows them to take up the account of the Cyberhaven Chrome store. With this access, the attackers downloaded a malicious version of the extension, which Chrome then automatically distributed to users via its update mechanism.

The falsified extension contained code connected to a remote server, received instructions and a supervised user activity. He stole silent cookies and passwords from the browser, compromising sensitive data from millions of devices. The modified version remained active for 31 hours before being deleted, but some of the other affected tools and their malicious versions have remained not detected for months, leaving users exposed without knowing it at safety risks.

The same can happen to any extension – Its developer account has compromised and a new malicious version of an extension previously legitimate pushed to its users Thanks to the practical and rapid automatic browser mechanism, without users realizing it.

Protect yourself

Given the above, we must agree courageous On this: “The safest way to use extensions … is not to use them at all.” However, it is also true that there are many safe, legitimate and practical tools in the form of browser extensions, used by millions of users who have undergone any harm. However, certain preventive measures are necessary.

  • If you don't need this extension much, don't add it.
  • If you don't use the extension all the time, deactivate it. Activate only when necessary.
  • If the tool that you are about to use has another version outside the browsers (an application, for example), consider this version. Installed applications, however, include their own risks.
  • Install and update safety tools (antivirus, firewall, etc.) on all your devices.
  • Before downloading any type of software, looking for its developers, reputation and privacy policy. Also check its ranking and number of downloads; You may have chosen a false version.
  • Download not only the extensions of official stores, but check external criticism and all the news concerning its developers on social networks.
  • Always check the authorizations granted to each extension and limit them as much as you can.
  • Keep an eye on your clipboard when you stick wallet addresses to catch unexpected changes. Some extensions could act as clipping malware. With ObyteYou can jump using addresses entirely by sending funds via text or certificates.
  • Strengthen account security by activating two factors authentication (2FA). In OBYTE WORKThis can be done by creating a multiDevice account in the global settings.
  • Protect your private keys outside the digital world and prefer external wallets. The obyte portfolio, for example, is available for mobile and office, and you can erase your wallet After writing it physically.
  • Regularly check the sources of trust for updates on the latest safety measures and developments in the cryptographic space!

Star vector image by Freepik

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblocker Detected

Please consider supporting us by disabling your ad blocker