BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Chrome extension steals MEXC API keys, enables theft online.

  • A malicious Chrome extension named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) steals newly created API keys with withdrawal rights from MEXC accounts.
  • The extension creates API keys inside an authenticated browser session, enables withdrawals, hides that permission in the UI, and sends keys to a hard-coded Telegram bot.
  • The add-on was published on September 1, 2025, has 29 downloads, and remained listed on the Chrome Web Store at the time of reporting.
  • Researchers warn the technique can be adapted to other exchanges and web consoles that issue tokens in-session.

On Jan. 13, 2026, researchers reported that a Chrome extension called MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) targets accounts on MEXC, a centralized crypto exchange available in over 170 countries (details). The extension was first published on September 1, 2025, by a developer using the handle “jorjortan142” and had 29 downloads.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Socket security researcher Kirill Boychenko described the extension’s behavior: “The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor.” The extension listing itself claims it “simplifies connecting your trading bot to the MEXC exchange.”

When a user visits the exchange’s API management page (/user/openapi), the add-on injects a content script that generates an API key, flips the withdrawal permission on, tampers with the UI to appear disabled, extracts the Access Key and Secret Key, and posts them to a hard-coded Telegram bot. The exfiltration uses an HTTPS POST request.

Attackers who receive valid API keys can execute trades and initiate withdrawals from any MEXC account accessed in the compromised browser. The keys remain usable until revoked, so access can persist even after the extension is uninstalled.

The developer handle links to an X account that promotes a Telegram bot named SwapSushiBot and appears on social channels such as TikTok and a YouTube channel. Socket warned the same approach could be adapted to other exchanges, DeFi dashboards, and broker portals.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Australian senate committee backs crypto licensing bill

A key Australian senate committee endorsed a bill that would require cryptocurrency exchanges and...

Android 17 Beta Tightens Accessibility API Security

Google is testing a new restriction in Android 17 Beta 2 that blocks non-accessibility...

Bitcoin Reclaims $74K Amid Geopolitical Optimism

Bitcoin has reclaimed the $74,000 price level for the first time since early February.Potential...

Australia Senate backs crypto regulation bill

A key Australian Senate committee has recommended passage of the Digital Assets Framework Bill,...

ASIC Warns Young Investors Against AI, Influencer Advice

A major Australian regulator found that over one in four Gen Z investors now...

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading