GhostPoster Malware Hits 50,000 Firefox Users via Malicious Add-ons

GhostPoster Malware Campaign Infects 17 Firefox Extensions to Hijack Affiliate Links and Conduct Ad Fraud on Over 50,000 Users

  • A campaign named GhostPoster used malicious logo files in 17 Mozilla Firefox add-ons to deliver Malware targeting over 50,000 users.
  • The malware hijacks affiliate links, injects tracking codes, removes browser security headers, and commits ad and click fraud.
  • The attack uses a multi-stage loader that fetches payloads with low frequency and delays activation to avoid detection.
  • The affected add-ons were falsely promoted as VPNs, ad blockers, translators, and utilities but are now removed.

A campaign known as GhostPoster exploited logo files in 17 Mozilla Firefox browser extensions to embed malicious JavaScript that hijacks affiliate links, injects tracking identifiers, and carries out ad and click fraud. This campaign was active through extensions collectively downloaded more than 50,000 times before their removal, according to findings shared by Koi Security.

- Advertisement -

These add-ons were presented as VPN services, screenshot tools, ad blockers, and unofficial Google Translate versions. The earliest add-on, named Dark Mode, was published in late October 2024. The list includes popular categories such as Free VPN, Screenshot, Weather, Mouse Gesture, and multiple Google Translate variants.

The malicious operation begins when the browser loads an extension’s logo file. The embedded code searches for a specific marker (“===”) within the image to extract and execute JavaScript. This loader contacts external domains like “www.liveupdt[.]com” or “www.dealctr[.]com” to retrieve a main payload. It waits 48 hours between requests and activates only 10% of the time to reduce the chance of detection.

This payload performs several harmful actions: it hijacks affiliate links to e-commerce sites like Taobao and JD.com, removing commissions from legitimate partners; inserts Google Analytics tracking code into visited pages; strips security headers like Content-Security-Policy and X-Frame-Options that protect against clickjacking and cross-site scripting attacks; and invisibly injects iframes to facilitate ad and click fraud. It also uses CAPTCHA bypass techniques to evade bot detection mechanisms while executing these operations.

“What they actually deliver is a multi-stage malware payload that monitors everything you browse, strips away your browser’s security protections, and opens a backdoor for remote code execution,” stated security researchers Lotan Sery and Noga Gouldman.

- Advertisement -

Additionally, the malware delays activation for over six days after installation, broadening its stealthiness. Although not every extension used the exact same method, all communicated with the same command-and-control infrastructure, indicating a single threat actor employing multiple tactics.

This discovery follows recent exposures of other malicious VPN extensions harvesting user data, including AI conversations and system information. Koi Security emphasized that free VPN promises often conceal surveillance functions rather than privacy protection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...

Tesla surges 89% in Norway; France, Sweden plunge 66/71% Dec

Tesla registrations in Norway jumped 89% in December to 5,679 vehicles.Tesla finished 2025 as...
- Advertisement -

Must Read

How to Buy VPN With Bitcoin Using CyberGhost VPN

In this step-by-step guide, you will learn how to purchase a VPN (Virtual Private Network) subscription using Bitcoin, a popular cryptocurrency, and CyberGhost VPN,...
Bitcoin (BTC) $ 90,560.00 3.04%
Ethereum (ETH) $ 3,138.75 5.34%
XRP (XRP) $ 1.98 6.18%
Bittensor (TAO) $ 244.56 8.67%
Polkadot (DOT) $ 2.06 8.03%
Cardano (ADA) $ 0.38922 11.41%
Chainlink (LINK) $ 13.32 7.64%
Hyperliquid (HYPE) $ 24.62 0.92%
Monero (XMR) $ 419.50 0.13%
Hedera (HBAR) $ 0.120253 8.70%
Toncoin (TON) $ 1.82 8.38%