A group of cryptocurrency threat actors dubbed “GreedyBear” has stolen over $1 million in what researchers describe as an industrial-scale campaign spanning malicious browser extensions, malware, and scam websites. GreedyBear has “redefined industrial-scale crypto theft,” according to Koi Security researcher…A group of cryptocurrency threat actors dubbed “GreedyBear” has stolen over $1 million in what researchers describe as an industrial-scale campaign spanning malicious browser extensions, malware, and scam websites. GreedyBear has “redefined industrial-scale crypto theft,” according to Koi Security researcher…

Crypto scam group GreedyBear steals over $1m using fake extensions and malware

A group of cryptocurrency threat actors dubbed “GreedyBear” has stolen over $1 million in what researchers describe as an industrial-scale campaign spanning malicious browser extensions, malware, and scam websites.

Summary
  • GreedyBear has reportedly stolen over $1 million through malicious extensions, malware, and scam websites.
  • More than 650 malicious tools targeting cryptocurrency wallet users were identified in the campaign.
  • Researchers found signs of AI-generated code used to scale and diversify attacks.

GreedyBear has “redefined industrial-scale crypto theft,” according to Koi Security researcher Tuval Admoni, who said the group’s approach blends multiple proven attack methods into one coordinated operation.

While most cybercriminal outfits specialize in a single vector, such as phishing, ransomware, or fake extensions, GreedyBear has pursued all three simultaneously at a large scale.

The findings come just days after blockchain security firm PeckShield reported a sharp rise in crypto crime in July, with bad actors stealing roughly $142 million across 17 major incidents.

Malicious browser extensions

Koi Security’s investigation found that GreedyBear’s current campaign has already deployed more than 650 malicious tools targeting cryptocurrency wallet users.

Admoni noted that this marks an escalation from the group’s earlier “Foxy Wallet” campaign, which in July exposed 40 malicious Firefox extensions. 

The group uses a technique Koi calls “Extension Hollowing” to bypass marketplace checks and gain user trust.  

Operators first publish innocuous-looking Firefox extensions — such as link sanitizers or video downloaders — under new publisher accounts. These are then padded with fake positive reviews before being converted into wallet-impersonating tools targeting MetaMask, TronLink, Exodus, and Rabby Wallet. 

Once weaponized, the extensions harvest credentials directly from user input fields and transmit them to GreedyBear’s command-and-control server.

Crypto Malware

Beyond extensions, researchers found nearly 500 malicious Windows executables tied to the same infrastructure. 

These files span multiple malware families, including credential stealers such as LummaStealer, ransomware variants resembling Luca Stealer, and generic trojans likely acting as loaders for other payloads.

Koi Security noted that many of these samples appear in malware distribution pipelines hosted on Russian-language websites that offer cracked, pirated, or “repacked” software. This distribution method not only widens the group’s reach to less security-conscious users but also allows them to seed infections beyond the crypto-native audience.

Researchers also found malware samples that demonstrated modular capabilities, suggesting the operators can update payloads or swap functions without deploying entirely new malware.

Scam crypto services

Running in parallel with these malware operations, GreedyBear maintains a network of scam websites that impersonate cryptocurrency products and services. These websites are designed to harvest sensitive information from unsuspecting users.

Koi Security found fake landing pages advertising hardware wallets, and bogus wallet-repair services claiming to fix popular devices like Trezor. Other pages were found to be promoting fake digital wallets or crypto utilities, all with professional-grade design.

Crypto scam group GreedyBear steals over $1m using fake extensions and malware - 1

Unlike traditional phishing sites that mimic exchange login pages, these scams pose as product showcases or support services. Visitors are lured into entering wallet recovery phrases, private keys, payment information, or other sensitive data, which the attackers then exfiltrate for follow-on theft or credit card fraud.

Koi’s investigation found that some of these domains were still active and harvesting data, while others appeared dormant but ready for activation in future campaigns.

A central node

Further, Koi found that nearly all domains connected to GreedyBear’s extensions, malware, and scam websites resolve to a single IP address — 185.208.156.66.

Crypto scam group GreedyBear steals over $1m using fake extensions and malware - 2

This server functions as the operation’s command-and-control hub, managing credential collection, ransomware coordination, and hosting for fraudulent websites. By consolidating operations on one infrastructure, the group is able to track victims, adjust payloads, and distribute stolen data with greater speed and efficiency.

According to Admoni, there were also signs of “AI-generated artifacts” found within the campaign’s code, which makes it “faster and easier than ever for attackers to scale operations, diversify payloads, and evade detection.”

“This isn’t a passing trend — it’s the new normal. As attackers arm themselves with increasingly capable AI, defenders must respond with equally advanced security tools and intelligence,” Admoni said.

Market Opportunity
Scamcoin Logo
Scamcoin Price(SCAM)
$0.001107
$0.001107$0.001107
-0.18%
USD
Scamcoin (SCAM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
Onyxcoin Price Breakout Coming — Is a 38% Move Next?

Onyxcoin Price Breakout Coming — Is a 38% Move Next?

The post Onyxcoin Price Breakout Coming — Is a 38% Move Next? appeared on BitcoinEthereumNews.com. Onyxcoin price action has entered a tense standoff between bulls
Share
BitcoinEthereumNews2026/01/14 00:33
Trading time: Tonight, the US GDP and the upcoming non-farm data will become the market focus. Institutions are bullish on BTC to $120,000 in the second quarter.

Trading time: Tonight, the US GDP and the upcoming non-farm data will become the market focus. Institutions are bullish on BTC to $120,000 in the second quarter.

Daily market key data review and trend analysis, produced by PANews.
Share
PANews2025/04/30 13:50