GreedyBear’s Record-Breaking Heist – $1 Million Stolen Using 650 Hacking Tools

A sophisticated cybercrime operation known as GreedyBear has orchestrated one of the most comprehensive cryptocurrency theft campaigns to date, combining over 650 hacking tools across multiple attack vectors to steal more than $1 million from unsuspecting victims.

Unlike traditional cybercriminal groups that specialize in single attack methods, GreedyBear has revolutionized digital theft by operating like a Fortune 500 company with diversified revenue streams.

Multi-Platform Extension Warfare

The group’s primary weapon consists of over 150 malicious Firefox extensions designed to impersonate popular cryptocurrency wallets, including MetaMask, TronLink, Exodus, and Rabby Wallet.

GreedyBear employs a technique called “Extension Hollowing” to bypass marketplace security systems with remarkable efficiency.

Their methodology involves creating legitimate publisher accounts and uploading 5-7 innocuous extensions such as link sanitizers and YouTube downloaders.

After posting dozens of fake positive reviews to build credibility, the attackers “hollow out” these extensions by changing names, icons, and injecting malicious code while preserving the positive review history.

This approach allows malware to slip past initial security reviews and gain user trust before weaponization. The malicious extensions capture wallet credentials directly from user input fields and transmit them to remote servers, along with victims’ IP addresses for tracking purposes.

Security researchers have traced this campaign’s origins to an earlier operation called “Foxy Wallet,” which initially involved 40 malicious extensions but has since quadrupled in scope.

Industrial-Scale Malware Distribution

Beyond browser extensions, GreedyBear operates a massive malware distribution network featuring nearly 500 malicious Windows executables identified through VirusTotal.

One of the trojans download page from rsload.net

These samples span multiple malware families, including credential stealers like LummaStealer, ransomware variants resembling Luca Stealer, and various trojans with loader functionality.

The executables are primarily distributed through Russian websites offering cracked or pirated software, targeting users seeking free alternatives to legitimate programs. This distribution method ensures a wide reach among users already comfortable with installing untrusted software.

Centralized Criminal Infrastructure

Perhaps most striking is GreedyBear’s infrastructure consolidation. Almost all domains spanning extensions, executable payloads, and phishing sites resolve to a single IP address: 185.208.156.66.

This server functions as a central command-and-control hub, streamlining operations across multiple attack channels while reducing operational complexity.

Connection graph for 185.208.156.66

The group also operates sophisticated scam websites masquerading as cryptocurrency products and services, including fake Jupiter-branded hardware wallets and wallet repair services.

These sites feature professional designs and fabricated UI mockups to deceive users into surrendering personal information and wallet credentials.

Security researchers note that GreedyBear’s code shows clear signs of AI-generated artifacts, suggesting the group leverages artificial intelligence to scale operations rapidly.

This represents a new evolution in cybercrime, where traditional limitations of manual coding and deployment no longer constrain malicious actors’ operational scope.

Priya
Priya
Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here