
A brand new marketing campaign dubbed ‘GhostPoster’ is hiding JavaScript code within the picture emblem of malicious Firefox extensions with greater than 50,000 downloads, to observe browser exercise and plant a backdoor.
The malicious code grants operators persistent high-privilege entry to the browser, enabling them to hijack affiliate hyperlinks, inject monitoring code, and commit click on and advert fraud.
The hidden script is appearing as a loader that fetches the principle payload from a distant server. To make the method tougher to detect, the payload is deliberately retrieved solely as soon as in ten makes an attempt.
Koi Safety researchers found the GhostPoster marketing campaign and recognized 17 compromised Firefox extensions that both learn the PNG emblem to extract and execute the malware loader or obtain the principle payload from the attacker’s server.
It ought to be famous that the malicious extensions are from common classes:
- free-vpn-forever
- screenshot-saved-easy
- weather-best-forecast
- crxmouse-gesture
- cache-fast-site-loader
- freemp3downloader
- google-translate-right-clicks
- google-traductor-esp
- world-wide-vpn
- dark-reader-for-ff
- translator-gbbd
- i-like-weather
- google-translate-pro-extension
- 谷歌-翻译
- libretv-watch-free-videos
- ad-stop
- right-click-google-translate
The researchers say that not all of the extensions above use the identical payload loading chain, however all of them exhibit the identical habits and talk with the identical infrastructure.
The FreeVPN Without end extension was the one Koi Safety analyzed initially after its AI software flagged it for parsing the uncooked bytes of its emblem picture file to find a JavaScript snippet hidden utilizing the steganography approach.

Supply: Koi Safety
The JavaScript loader prompts 48 hours later to fetch a payload from a hardcoded area. A second backup area is on the market if the payload will not be retrieved from the primary one.
In response to Koi Safety, the loader is generally dormant and will get the payload solely 10% of the time, making it prone to evade detection from visitors monitoring instruments.
The downloaded payload is closely obfuscated through case swapping and base64 encoding. A cipher decodes it after which XOR-encrypts it utilizing a key derived from the extension’s runtime ID.

Supply: Koi Safety
The ultimate payload has the next capabilities:
- Hijacks affiliate hyperlinks on main e-commerce websites, redirecting commissions to the attackers.
- Injects Google Analytics monitoring into each web page the consumer visits.
- Strips safety headers from all HTTP responses.
- Bypasses CAPTCHA through three distinct mechanisms to avoid bot protections.
- Injects invisible iframes for advert fraud, click on fraud, and monitoring, which self-delete after 15 seconds.
Though the malware doesn’t harvest passwords or redirect customers to phishing pages, it nonetheless threatens consumer privateness.
Furthermore, as a result of stealthy loader employed by GhostPoster, the marketing campaign might rapidly turn into way more harmful if the operator decides to deploy a extra dangerous payload.
Customers of the listed extensions are advisable to take away them and may contemplate resetting passwords for important accounts.
Lots of the malicious extensions had been nonetheless accessible on Firefox’s Add-Ons web page on the time of writing. BleepingComputer has contacted Mozilla about it, and a spokesperson shared the beneath remark:
“Person security is one thing we’ve all the time prioritized and brought very severely. Our add-ons staff has investigated this report and consequently, has taken motion to take away all of those extensions from AMO. We’ve got up to date our automated programs to detect and block extensions utilizing related assaults now and sooner or later. We proceed to enhance our programs as new assaults seem.” – Mozilla spokesperson
Replace 12/17 – Added Mozilla assertion
Damaged IAM is not simply an IT downside – the influence ripples throughout your entire enterprise.
This sensible information covers why conventional IAM practices fail to maintain up with fashionable calls for, examples of what “good” IAM seems like, and a easy guidelines for constructing a scalable technique.

