Chrome extension steals MEXC API keys, enables theft online.

  • A malicious Chrome extension named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) steals newly created API keys with withdrawal rights from MEXC accounts.
  • The extension creates API keys inside an authenticated browser session, enables withdrawals, hides that permission in the UI, and sends keys to a hard-coded Telegram bot.
  • The add-on was published on September 1, 2025, has 29 downloads, and remained listed on the Chrome Web Store at the time of reporting.
  • Researchers warn the technique can be adapted to other exchanges and web consoles that issue tokens in-session.

On Jan. 13, 2026, researchers reported that a Chrome extension called MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) targets accounts on MEXC, a centralized crypto exchange available in over 170 countries (details). The extension was first published on September 1, 2025, by a developer using the handle “jorjortan142” and had 29 downloads.

- Advertisement -

Socket security researcher Kirill Boychenko described the extension’s behavior: “The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor.” The extension listing itself claims it “simplifies connecting your trading bot to the MEXC exchange.”

When a user visits the exchange’s API management page (/user/openapi), the add-on injects a content script that generates an API key, flips the withdrawal permission on, tampers with the UI to appear disabled, extracts the Access Key and Secret Key, and posts them to a hard-coded Telegram bot. The exfiltration uses an HTTPS POST request.

Attackers who receive valid API keys can execute trades and initiate withdrawals from any MEXC account accessed in the compromised browser. The keys remain usable until revoked, so access can persist even after the extension is uninstalled.

The developer handle links to an X account that promotes a Telegram bot named SwapSushiBot and appears on social channels such as TikTok and a YouTube channel. Socket warned the same approach could be adapted to other exchanges, DeFi dashboards, and broker portals.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Buterin: Ethereum Block Times Could Drop To 2 Seconds

Ethereum co-founder Vitalik Buterin has elaborated on a bold new roadmap aiming to dramatically...

How Wall Street Bitcoin ETFs Weaken Spot Price Link

Bitcoin ETF share creation/redemption by authorized participants does not require immediate Bitcoin purchases or...

Nvidia AI Segment Eyed for $50B by 2030

Analyst Gene Munster estimates 70% of NVIDIA’s revenue currently comes from just eight major...

Bitcoin Demand Surges As Price Nears One-Year Low

Global Google searches for "buy Bitcoin" have hit a five-year peak, a historic signal...

AI models escalate to nukes in 95% of war games

AI models from OpenAI, Anthropic, and Google deployed nuclear weapons in 95% of war-game...

Must Read

Top 8 Best Anonymous Web Hosting Companies That Accept Crypto

Nowadays, there is plenty of information about people online, and malicious people use them to carry out inappropriate activities. If you want to keep...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!