Security researchers have discovered an extensive network of malicious Firefox extensions that used the names of tools and known games to trick users into downloading them.
It’s one thing to download a browser add-on from a shady corner of the Internet, and a completely different situation when you get it from an official website. It’s a common problem that rears its ugly head on other platforms. Google, for example, had similar issues in the past with distribution of malicious apps via its official store.
These malicious Firefox add-ons discovered by the Socket Threat Research Team are linked to a threat actor known as mre1903.
Fake gaming extensions leveraging popular titles
Security researchers have identified multiple add-ons that used names of popular games, including:
The add-ons provided no gaming content and immediately triggered popups after installation, redirecting victims to gambling websites and fake Apple virus alert pages. Of course, the alerts typically display fabricated error codes to deceive users into providing personal or financial details to the attacker.
According to researchers, the ‘mre1903’ threat actor has been around since June 2018. It appears that it began to escalate its activities around December 2020.
The hooks are not restricted to just games
Additional malicious add-ons researchers identified have displayed even more severe privacy violations:
All of these add-ons use a combination of social engineering and technical sophistication, demonstrating just how advanced this type of threat has become.
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all postsMay 23, 2025
May 16, 2025
April 03, 2025