BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Chrome extension steals MEXC API keys, enables theft online.

  • A malicious Chrome extension named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) steals newly created API keys with withdrawal rights from MEXC accounts.
  • The extension creates API keys inside an authenticated browser session, enables withdrawals, hides that permission in the UI, and sends keys to a hard-coded Telegram bot.
  • The add-on was published on September 1, 2025, has 29 downloads, and remained listed on the Chrome Web Store at the time of reporting.
  • Researchers warn the technique can be adapted to other exchanges and web consoles that issue tokens in-session.

On Jan. 13, 2026, researchers reported that a Chrome extension called MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) targets accounts on MEXC, a centralized crypto exchange available in over 170 countries (details). The extension was first published on September 1, 2025, by a developer using the handle “jorjortan142” and had 29 downloads.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Socket security researcher Kirill Boychenko described the extension’s behavior: “The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor.” The extension listing itself claims it “simplifies connecting your trading bot to the MEXC exchange.”

When a user visits the exchange’s API management page (/user/openapi), the add-on injects a content script that generates an API key, flips the withdrawal permission on, tampers with the UI to appear disabled, extracts the Access Key and Secret Key, and posts them to a hard-coded Telegram bot. The exfiltration uses an HTTPS POST request.

Attackers who receive valid API keys can execute trades and initiate withdrawals from any MEXC account accessed in the compromised browser. The keys remain usable until revoked, so access can persist even after the extension is uninstalled.

The developer handle links to an X account that promotes a Telegram bot named SwapSushiBot and appears on social channels such as TikTok and a YouTube channel. Socket warned the same approach could be adapted to other exchanges, DeFi dashboards, and broker portals.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Meta Shuts Down Virtual Reality Horizon Worlds in June

Meta Platforms will shut down its Horizon Worlds Metaverse for VR users in June,...

Bitrefill hacked by Lazarus Group-linked cyberattack

Bitrefill, a crypto e-commerce platform, was attacked on March 1 by Hackers with methods...

NVIDIA’s DLSS 5 Sparks Backlash Over “AI Art” Changes

NVIDIA unveiled DLSS 5 at GTC 2026, marking a shift from performance upscaling to...

Poloniex’s $1.3B BTC Reserve Shortfall Exposed

Poloniex announced fee-free trading for members of its "Poloniex Super" program, but did not...

Lawmakers Target Prediction Markets Citing War Betting

US lawmakers introduced the BETS OFF Act to ban betting on sensitive government operations,...

Must Read

Top 8 Best Anonymous Web Hosting Companies That Accept Crypto

Nowadays, there is plenty of information about people online, and malicious people use them to carry out inappropriate activities. If you want to keep...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading