BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

GhostPoster Malware Hits 50,000 Firefox Users via Malicious Add-ons

GhostPoster Malware Campaign Infects 17 Firefox Extensions to Hijack Affiliate Links and Conduct Ad Fraud on Over 50,000 Users

  • A campaign named GhostPoster used malicious logo files in 17 Mozilla Firefox add-ons to deliver Malware targeting over 50,000 users.
  • The malware hijacks affiliate links, injects tracking codes, removes browser security headers, and commits ad and click fraud.
  • The attack uses a multi-stage loader that fetches payloads with low frequency and delays activation to avoid detection.
  • The affected add-ons were falsely promoted as VPNs, ad blockers, translators, and utilities but are now removed.

A campaign known as GhostPoster exploited logo files in 17 Mozilla Firefox browser extensions to embed malicious JavaScript that hijacks affiliate links, injects tracking identifiers, and carries out ad and click fraud. This campaign was active through extensions collectively downloaded more than 50,000 times before their removal, according to findings shared by Koi Security.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

These add-ons were presented as VPN services, screenshot tools, ad blockers, and unofficial Google Translate versions. The earliest add-on, named Dark Mode, was published in late October 2024. The list includes popular categories such as Free VPN, Screenshot, Weather, Mouse Gesture, and multiple Google Translate variants.

The malicious operation begins when the browser loads an extension’s logo file. The embedded code searches for a specific marker (“===”) within the image to extract and execute JavaScript. This loader contacts external domains like “www.liveupdt[.]com” or “www.dealctr[.]com” to retrieve a main payload. It waits 48 hours between requests and activates only 10% of the time to reduce the chance of detection.

This payload performs several harmful actions: it hijacks affiliate links to e-commerce sites like Taobao and JD.com, removing commissions from legitimate partners; inserts Google Analytics tracking code into visited pages; strips security headers like Content-Security-Policy and X-Frame-Options that protect against clickjacking and cross-site scripting attacks; and invisibly injects iframes to facilitate ad and click fraud. It also uses CAPTCHA bypass techniques to evade bot detection mechanisms while executing these operations.

“What they actually deliver is a multi-stage malware payload that monitors everything you browse, strips away your browser’s security protections, and opens a backdoor for remote code execution,” stated security researchers Lotan Sery and Noga Gouldman.

- Advertisement -

Additionally, the malware delays activation for over six days after installation, broadening its stealthiness. Although not every extension used the exact same method, all communicated with the same command-and-control infrastructure, indicating a single threat actor employing multiple tactics.

This discovery follows recent exposures of other malicious VPN extensions harvesting user data, including AI conversations and system information. Koi Security emphasized that free VPN promises often conceal surveillance functions rather than privacy protection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Google Sets 2029 Deadline for Quantum Crypto Switch

Google has declared a 2029 deadline to migrate its products to post-quantum cryptography, citing...

Crypto Developer Loses Bid for Lawsuit Protection

A federal judge dismissed a lawsuit from crypto developer Michael Lewellen seeking pre-approval for...

RBA: Tokenization Is “How, Not If” for Australia

The Reserve Bank of Australia (RBA) states that asset tokenization's future is now a...

Circle Wrongly Froze 16 Wallets: ZachXBT

Onchain investigator ZachXBT claims stablecoin issuer Circle incorrectly froze 16 USDC wallets linked to...

Google Targets 2029 Quantum Crypto Deadline, Bitcoin at Risk

Google has set a 2029 deadline to transition its systems to post-quantum cryptography, warning...

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading