Cyber News

8 Harmful Firefox Add-ons Harvest OAuth Tokens, Passwords, and Spy on Users

As browser extensions become an integral part of our daily web experience, new research highlights a concerning surge in malicious add-ons targeting Firefox users.

In recent findings, security analysts have identified at least eight Firefox extensions masquerading as gaming apps or productivity tools that are actively spying on users, harvesting credentials, and rerouting web traffic for profit.

OAuth Tokens, Passwords, and Stealthy Surveillance

Among the most dangerous is the “CalSyncMaster” extension, posing as a benign calendar sync tool. Once installed, CalSyncMaster exploits OAuth authentication flows to steal Google access tokens quietly.

By intercepting the redirect URL after users log into their Google accounts, the extension extracts the access token and transmits it to a remote command-and-control server.

This grants attackers ongoing, stealthy access to sensitive calendar data information, invaluable for orchestrating social engineering attacks or even corporate espionage.

Worse, the extension’s design allows for rapid escalation; with a minor update, it could demand broader permissions, enabling attackers to manipulate events or delete user data.

Other extensions, such as “VPN – Grab a Proxy – Free,” claim to enhance privacy but do the opposite. This add-on silently injects invisible tracking iframes into every web page viewed and coerces the browser into routing all traffic through attacker-controlled proxies.

These proxies can log user activity, intercept credentials, and even downgrade HTTPS connections, allowing for seamless man-in-the-middle attacks.

Familiar Faces, Dangerous Code

Malicious actors are leveraging the popularity of classic online games to bypass user suspicion. Extensions such as “1v1.LOL,” “Krunker io Game,” “Five Nights at Freddy’s,” and “Little Alchemy 2” don’t deliver the gameplay they promise.

Instead, upon installation, they redirect users to fraudulent virus alerts and scam-laden betting websites, sometimes designed to mimic Apple system warnings in an attempt to extort personal information or money.

Secret Affiliate Hijacking

Affiliate hijacking schemes are also rampant. The “GimmeGimme” add-on claims to enhance shopping with wishlist features, but in reality, it redirects user sessions through affiliate links to siphon commissions, impacting legitimate cashback and loyalty programs.

Protecting Yourself

Security experts advise users to audit their installed browser extensions regularly and remain wary of those requesting broad permissions, especially “access to all websites.”

Organizations should deploy extension allow-lists and monitor for unauthorized proxy configurations or suspicious network activity.

These campaigns underscore a sobering truth: trusted browser extensions can be the weakest link in your online security.

With attackers now blending social engineering and technical sophistication, vigilance is more crucial than ever in defending personal data and online privacy.

Indicators of Compromise:

  • Malicious domains: funformathgame[.]com, polar-shore-05125-b49ae913d73c[.]herokuapp[.]com
  • Dangerous extensions: CalSyncMaster, VPN – Grab a Proxy – Free, GimmeGimme, 1v1.LOL, Krunker io Game, Five Nights at Freddy’s, Little Alchemy 2, Bubble Spinner

Stay alert, audit often, and don’t let your favorite add-ons open the door to cybercrime.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago