• CONTACT
  • MARKETCAP
  • BLOG
Crypto NEWS
  • BOOKMARKS
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Reading: Crypto Thieves Dubbed ‘GreedyBear’ Run Industrial-Scale Scam
Share

Crypto NEWS

0
Font ResizerAa
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
Search
  • Home
  • Shop
  • Bitcoin
  • Crypto News
  • Altcoin
  • Blockchain
  • Market Trends
  • Legal Docs
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • About CryptoNewsUpdate.com
Have an existing account? Sign In
Follow US
© Crypto NEWS Update. All Rights Reserved.
Crypto NEWS > Blog > Crypto News > Crypto Thieves Dubbed ‘GreedyBear’ Run Industrial-Scale Scam
Crypto News

Crypto Thieves Dubbed ‘GreedyBear’ Run Industrial-Scale Scam

yangzeph4@gmail.com
Last updated: August 11, 2025 4:35 am
yangzeph4@gmail.com Published August 11, 2025
Share
Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure

A cybercrime group called “GreedyBear” has been accused of stealing over $1 million through what researchers say is one of the most wide-reaching crypto theft operations seen in months.

Reports from Koi Security reveal the group is running a coordinated campaign that mixes malicious browser extensions, malware, and scam websites — all under one network.

Extensions Turned Into Wallet-Stealing Tools

Instead of focusing on just one method, GreedyBear has combined several. According to Koi Security researcher Tuval Admoni, the group has deployed more than 650 malicious tools in its latest push.

This marks a sharp rise from its earlier “Foxy Wallet” operation in July, which involved 40 Firefox extensions.

The group’s tactic, called “Extension Hollowing,” starts with publishing clean-looking Firefox add-ons such as video downloaders or link cleaners.

These extensions, released under fresh publisher accounts, collect fake positive reviews to appear trustworthy. Later, they are swapped for malicious versions impersonating wallets like MetaMask, TronLink, Exodus, and Rabby Wallet.

Once installed, they grab credentials from input fields and send them to GreedyBear’s control servers.

Malware Hidden In Pirated Software

Investigators have also tied nearly 500 malicious Windows files to the same group. Many of these belong to well-known malware families such as LummaStealer, ransomware similar to Luca Stealer, and trojans acting as loaders for other harmful programs.

Distribution frequently occurs through Russian-language websites that host cracked or “repacked” software. Targeting those seeking free software, the attackers reach far beyond the crypto community.

Modular malware was also found by Koi Security, in which operators can add or swap functions without deploying completely new files.

Total crypto market cap currently $3.9 trillion. Chart: TradingView

Fake Crypto Services Created To Swipe Data

Based on reports, in addition to the browser attacks and malware, GreedyBear has established fraudulent websites that fake themselves as genuine cryptocurrency solutions.

Some of these are said to offer hardware wallets, and others are fake wallet repair services for devices such as Trezor.

Also on offer are fake wallet apps with good-looking designs that trick users into inputting recovery phrases, private keys, and payment information.

Unlike standard phishing sites that copy exchange login pages, these scam pages look more like product or support portals.

Reports added that some of them remain active and are still collecting sensitive data, while others are on standby for future use.

Investigators found that nearly all domains tied to these operations lead back to a single IP address — 185.208.156.66. This server acts as the campaign’s hub, handling stolen credentials, coordinating ransomware activity, and hosting scam sites.

Featured image from Unsplash, chart from TradingView

Editorial Process for bitcoinist is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.

You Might Also Like

AI Models Predict Ethereum Cycle Top At $15,000: Analyst

Chainlink, ICE Partner to Deliver Forex and Precious Metals Data Onchain for DeFi

Nostr Wallet Connect Is The USB-C Connector Of Bitcoin Wallets

White House Shakes Up Crypto Policy: Who Is Patrick Witt?

Ethereum Faith Fading? Mow Says Holders Will Shift To Bitcoin

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Copy Link Print
Previous Article XRP Dominance Explodes, Decoupling From BTC, ETH Has Begun
Next Article Bitcoin Pioneer Predicts Ethereum Rotation Despite Market Cycles
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow US

Find US on Socials

Subscribe to our newslettern

Get Newest Articles Instantly!

Popular News
AI Models Predict Ethereum Cycle Top At $15,000: Analyst
Blocktech Brew Join Hands With Qila To Promote Web3 Services Across Industries!
$150M money market funds added to Arbitrum’s RWA ecosystem

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
Crypto NEWS

We influence 20 million users and is the number one business blockchain and crypto news network on the planet.

Subscribe to our newsletter

You can be the first to find out the latest news and tips about trading, markets...

Ad image
© Crypto NEWS Update. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?