GreedyBear Crypto Theft: How Hackers Stole Over $1M Using Malicious Extensions and Malware

Cybercriminals have raised the stakes once again. The notorious group known as GreedyBear has successfully stolen over $1 million in cryptocurrency by launching a coordinated, large-scale attack leveraging browser extensions, malicious executables, and fake websites.

1. Weaponized Firefox Extensions: Extension Hollowing

GreedyBear published over 150 Firefox extensions that initially appeared harmless, such as link cleaners and video tools. Once enough users downloaded them, these extensions were updated with malicious scripts designed to mimic trusted wallets like MetaMask, TronLink, Exodus, and Rabby Wallet.

This method, known as extension hollowing, enabled them to steal wallet credentials and IP addresses directly from the browser’s UI elements.

2. Malware Executables Targeting Windows

The group deployed nearly 500 malicious executable files containing credential stealers like LummaStealer, ransomware variants, and Trojans. These files were distributed through Russian-language piracy websites hosting cracked or repacked software, enticing users into unknowingly installing malware.

3. Phishing Pages and Fake Crypto Websites

GreedyBear also set up scam websites pretending to offer crypto services like wallet tools or hardware wallets. These professionally designed sites tricked users into submitting sensitive data under false pretenses.

4. Single Command-and-Control Infrastructure

All attack components traced back to a central IP address: 185.208.156.66. This C2 server managed browser extension payloads, malware communication, and phishing operations, indicating a well-coordinated infrastructure.

5. A Campaign of Escalation

Originally known for the Foxy Wallet campaign with 40+ extensions, GreedyBear has now scaled to over 150 active threats. This rapid growth suggests AI-assisted malware development and a push for industrialized cyber theft.

Protect Yourself: Cyber Hygiene Tips

  • Review and remove unfamiliar browser extensions frequently.
  • Use verified, audited wallets—avoid browser-based crypto tools unless necessary.
  • Avoid pirated software downloads from untrusted sources.
  • Enable multi-factor authentication (MFA) on crypto accounts.
  • Reset credentials immediately if you suspect compromise.
  • Store your assets offline using cold wallets when possible.

Summary Table

Aspect Details
Theft Amount Over $1 million in cryptocurrency
Attack Vectors Browser extensions, malware executables, scam websites
Tools Used Extension Hollowing, AI malware, credential stealers
C2 Server 185.208.156.66
Initial Campaign Foxy Wallet – now rebranded and expanded

Conclusion

The GreedyBear campaign showcases how cybercrime groups are evolving with sophisticated, multi-pronged strategies. Crypto users must adopt better security practices, remain vigilant, and avoid tools or software that haven’t been extensively vetted. As cyber threats escalate, proactive defense is the best safeguard.