• Send Us A Tip
  • Calling all Tech Writers
  • Advertise
Monday, July 14, 2025
  • Login
TechStory
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
TechStory
No Result
View All Result
Home Crypto

Surging “FoxyWallet” Scams: How Fake Crypto Wallet Add-ons Are Lurking in Firefox

by Anindya Paul
July 4, 2025
in Crypto
Reading Time: 4 mins read
0
FoxyWallet

Source: Mozilla

TwitterWhatsappLinkedin

Since April 2025, a growing series of false cryptocurrency wallet extensions, collectively called “FoxyWallet”, have made their way into the Firefox Add on store. Appearing as well-known brands like MetaMask, Coinbase, Trust Wallet, and Phantom, these impostors use cloned open source code with malicious payloads. As a result, users’ seed phrases and private keys are captured and siphoned away by attackers, probably a Russian speaking threat group, allowing them to drain crypto assets from there on out.

You might also like

Institutional Bitcoin Boom: Bitwise CIO Predicts BTC Rally to $200,000 by Year-End

Bitcoin Overtakes Google and Silver, Sets Sights on Amazon

CZ Strikes Back: Binance Founder Threatens Bloomberg with Defamation Lawsuit

A Coordinated Scam Since April

Koi Security has linked over 40 fake wallet extensions to this campaign, noting that new versions appear almost weekly. These impersonators provide users with the expected wallet interface to distract them from submitting sensitive inputs—such as seed phrases longer than typically longer than 30 characters—and then used to transmit the phrase with the user’s IP to attackers server.

How Trust Is Fabricated

The scam employs a variety of means to create false legitimacy:

  • Identical branding: they use legitimate names, and logos from genuine wallets.
  • Fake five star reviews: Inflated review counts far exceed real installation figures, misleading users.
  • Open source tactics: The clones maintain normal functionality but embed malicious code—a low effort, high impact strategy.

As a result, users reviewing the browser interface see what appears to be a safe, well rated extension, unaware that a silent attacker is harvesting credentials.

Who’s Behind the Mask?

Malware analysis showed comments in Russian, and a command and control PDF with metadata suggests links to Russian speaking group. Attribution is still preliminary, however, the multilingual footprint suggests a potentially more coordinated effort.

Mozilla’s Defensive Steps

Mozilla implemented a new “early detection” defense on June 3, assigning risk profiles to add ons and flagging suspicious submissions for human review. That measure has led to the removal of many offending extensions, yet at least seven still linger in the store as of early July.
A Mozilla spokesperson confirmed that the company continues to refine its systems and pull down malicious extensions swiftly once identified.

Broader Implications: Beyond Browser Scams

The FoxyWallet scandal is just one facet of a broader crypto fraud landscape. Hardware wallet scams, fake Ledger Live clones, and physical phishing campaigns—like USPS sent QR code letters—are also emerging threats. In the first half of 2025 alone, wallet breaches have yielded more than $1.7 billion in losses.

Staying Safe: Practical Advice

Bundled Apps: Extensions, add-ons, or apps are often bundled with software that you are installing. Caution should be practiced because you may be installing other potentially unwanted software.
To protect yourself from these threats, experts suggest:

  • Check publisher identity: Download from the published wallet website and not a search engine.
  • Monitoring ratings and install counts: Are there high ratings and not many installs? The difference in rating and installs can be very misleading.
  • Vet open source clones very carefully: A legitimate extension being a clone is not a guarantee-it must come from verifiable sources.
  • Treat extensions as critical software assets: Apply policies, allowlists, and ongoing scrutiny to browser extensions—just like apps on your phone or desktop.

Final Word

The FoxyWallet embers of extortion provide a strong reminder that even trusted platforms like Firefox can be compromised. The convenience offered by browser crypto access comes with inherent risk and once an attacker obtains your seed phrase, there is nearly no way to reverse the situation. Although vigilance rewarded by verifiable sources with cautious extension use is your greatest defense in a hacked world where cybercriminals can easily mimic legitimacy.

Tweet55SendShare15
Previous Post

How to cancel your Gold Gym membership?

Next Post

U.S. Lawmakers Set National Blockchain Strategy in Motion

Anindya Paul

Professional content creator with strong expertise in content writing, filmmaking and social media strategy. Skilled in digital storytelling, scriptwriting, video production, sound design and graphic design - crafting compelling narratives across platforms. Known for delivering high-quality, engaging content under tight deadlines. A collaborative team player with a sharp creative instinct, adaptability to evolving trends, and a focus on impactful, results-driven communication.

Recommended For You

Institutional Bitcoin Boom: Bitwise CIO Predicts BTC Rally to $200,000 by Year-End

by Anindya Paul
July 13, 2025
0
Bitcoin

A strong surge of institutional demand for Bitcoin is transforming the cryptocurrency environment. Matt Hougan, Chief Investment Officer at Bitwise Asset Management, believes this influx of demand, paired with...

Read more

Bitcoin Overtakes Google and Silver, Sets Sights on Amazon

by Anindya Paul
July 13, 2025
0
Bitcoin

Once again, Bitcoin has obliterated expectations. In July, during a market rally, the world's largest cryptocurrency reached an all-time high near $118,755, propelling its market capitalization above traditional...

Read more

CZ Strikes Back: Binance Founder Threatens Bloomberg with Defamation Lawsuit

by Anindya Paul
July 13, 2025
0
CZ

Binance’s founder Changpeng “CZ” Zhao has escalated tensions with Bloomberg, publicly threatening legal action over a recent article he labels a “hit piece.” In a fiery response on...

Read more
Next Post
U.S.

U.S. Lawmakers Set National Blockchain Strategy in Motion

Please login to join discussion

Techstory

Tech and Business News from around the world. Follow along for latest in the world of Tech, AI, Crypto, EVs, Business Personalities and more.
reach us at [email protected]

Advertise With Us

Reach out at - [email protected]

BROWSE BY TAG

#Crypto #howto 2024 acquisition AI amazon Apple bitcoin Business China cryptocurrency e-commerce electric vehicles Elon Musk Ethereum facebook flipkart funding Gaming Google India Instagram Investment ios iPhone IPO Market Markets Meta Microsoft News NFT samsung Social Media SpaceX startup startups tech technology Tesla TikTok trend trending twitter US

© 2024 Techstory.in

No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to

© 2024 Techstory.in

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?