Mozilla has issued an urgent advisory to add-on developers, alerting them to a sophisticated phishing campaign aimed at compromising accounts on the Mozilla Add-ons (AMO) platform.
The security teams detected the malicious effort when several developers reported receiving deceptive emails that mimic official communication from Mozilla.
This article outlines the nature of the threat, steps to verify legitimate messages, and recommended actions to safeguard developer credentials.
On August 1, 2025, Mozilla’s Add-ons Community Blog announced that attackers are distributing emails misrepresenting themselves as urgent notices from “Mozilla Add-ons” or “AMO.”
The fraudulent messages typically claim that a developer’s AMO account “requires an update to continue accessing developer features.”
In reality, these emails contain links to malicious sites designed to harvest login credentials.
Once credentials are compromised, attackers could take control of developer profiles, modify or publish malicious extensions, or access private project data.
Mozilla’s investigation indicates that the phishing emails are crafted to appear authentic: they use Mozilla’s branding and refer to developer-specific terminology.
However, the messages originate from unauthorized domains and bypass standard safeguards by closely imitating legitimate notifications.
While the precise scale of the campaign remains under assessment, even a small number of compromised accounts could pose serious risks to the ecosystem, as malicious add-ons can distribute malware or compromise user privacy at scale.
To combat the phishing efforts, Mozilla recommends that all add-on developers adopt rigorous verification procedures before interacting with any email claiming to originate from AMO. Key checks include:
These precautions help distinguish legitimate service announcements from malicious imitations, reducing the likelihood of credential compromise.
Mozilla is coordinating with cybersecurity organizations to monitor the phishing campaign and update defensive measures as attackers adapt their tactics.
Developers who receive suspicious emails are urged to report them to Mozilla’s security team and to delete the messages.
Detailed guidance on identifying and reporting phishing scams is available from the U.S. Federal Trade Commission and the U.K. National Cyber Security Centre, which provide general best practices for email security and incident reporting.
Although Mozilla has not yet released information on the full extent of the breach or the actors involved, the company pledges to share updates as the situation evolves.
In the meantime, add-on developers should remain vigilant, follow the outlined verification steps, and maintain up-to-date passwords and two-factor authentication where available.
By exercising caution and adhering to email security protocols, the developer community can thwart phishing attempts and protect the integrity of the Mozilla Add-ons ecosystem.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…