skip to Main Content
bitcoin
Bitcoin (BTC) $ 98,092.28 4.33%
ethereum
Ethereum (ETH) $ 3,492.43 2.57%
tether
Tether (USDT) $ 0.99914 0.04%
xrp
XRP (XRP) $ 2.30 2.38%
bnb
BNB (BNB) $ 702.84 1.75%
solana
Solana (SOL) $ 198.81 4.24%
dogecoin
Dogecoin (DOGE) $ 0.332919 3.74%
usd-coin
USDC (USDC) $ 1.00 0.04%
staked-ether
Lido Staked Ether (STETH) $ 3,487.83 2.65%
cardano
Cardano (ADA) $ 0.923148 2.54%

This Trader Reportedly Lost $800k in Crypto Through Malicious Chrome Extensions

An anonymous cryptocurrency investor with the username “Sell When Over” on X has reported a loss of $800,000 due to two allegedly malicious Google Chrome browser extensions.

The investor first raised the alarm with a post on X, revealing that they had discovered a loss of $500,000 from multiple wallet applications.

Chrome Extension Attack Leads to $800k Loss

“Think I got extension attacked, with two suspicious extensions that appeared on my Chrome browser,” they disclosed. Further investigation by the victim uncovered the extent of the compromise, amounting to a loss of $800,000. They suspected a compromise in their Google Chrome browser, potentially involving a keylogger targeting specific crypto wallet extensions.

Several weeks prior, the trader repeatedly postponed an update for Google Chrome. However, a mandatory Windows update eventually forced a system restart. Upon relaunching Chrome, they noticed that all their tabs had disappeared and extension logins had been reset.

Following the incident, the victim was forced to re-enter all their credentials on Chrome and manually reimport seed phrases for their cryptocurrency wallets from a separate secure device.

The user suspects that the keylogger compromised their sensitive information, leading to funds being drained afterward. The user also did not observe any abnormal behavior in their browser following the restart, with their virus scanner indicating no issues and no other suspicious extensions.

Chrome Extensions Identified as Keyloggers

After the preliminary investigation, they identified two suspicious extensions – “Sync test beta” and “Simple Game” and an auto Korean translation setting enabled in Chrome.

The user remained unsure how exactly their Chrome browser was compromised but confirmed that the “Sync test BETA” extension was a keylogger. Meanwhile, “Simple Game” appeared to monitor tab activities and communicate with an external site’s PHP script.

“This is an $800k costly mistake – lesson is if anything seems off such that it prompts you to input a seed, then wipe the whole PC first,” the trader cautioned.

They also explained that their guard had been down because the update coincided with a major Chrome update, which included changes to the user selection process and the sign-in interface with Google. This led them to think that the reset of extensions and the loss of tabs were due to this significant update.

As of the latest update, the attackers have reportedly transferred the funds to two exchanges: MEXC, located in Singapore, and Gate.io, headquartered in the Cayman Islands.

The post This Trader Reportedly Lost $800k in Crypto Through Malicious Chrome Extensions appeared first on CryptoPotato.

Loading data ...
Comparison
View chart compare
View table compare
Back To Top