By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
Computing

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

News Room
Last updated: 2025/12/17 at 4:52 AM
News Room Published 17 December 2025
Share
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads
SHARE

Dec 17, 2025Ravie LakshmananAd Fraud / Browser Security

A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud.

The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.

These browser programs were advertised as VPNs, screenshot utilities, ad blockers, and unofficial versions of Google Translate. The oldest add-on, Dark Mode, was published on October 25, 2024, offering the ability to enable a dark theme for all websites. The full list of the browser add-ons is below –

  • Free VPN
  • Screenshot
  • Weather (weather-best-forecast)
  • Mouse Gesture (crxMouse)
  • Cache – Fast site loader
  • Free MP3 Downloader
  • Google Translate (google-translate-right-clicks)
  • Traductor de Google
  • Global VPN – Free Forever
  • Dark Reader Dark Mode
  • Translator – Google Bing Baidu DeepL
  • Weather (i-like-weather)
  • Google Translate (google-translate-pro-extension)
  • 谷歌翻译
  • libretv-watch-free-videos
  • Ad Stop – Best Ad Blocker
  • Google Translate (right-click-google-translate)
Cybersecurity

“What they actually deliver is a multi-stage malware payload that monitors everything you browse, strips away your browser’s security protections, and opens a backdoor for remote code execution,” security researchers Lotan Sery and Noga Gouldman said.

The attack chain begins when the logo file is fetched when one of the above-mentioned extensions is loaded. The malicious code parses the file to look for a marker containing the “===” sign in order to extract JavaScript code, a loader that reaches out to an external server (“www.liveupdt[.]com” or “www.dealctr[.]com”) to retrieve the main payload, waiting 48 hours in between every attempt.

To further evade detection, the loader is configured to fetch the payload only 10% of the time. This randomness is a deliberate choice that’s introduced to sidestep efforts to monitor network traffic. The retrieved payload is a custom-encoded comprehensive toolkit capable of monetizing browser activities without the victims’ knowledge through four different ways –

  • Affiliate link hijacking, which intercepts affiliate links to e-commerce sites like Taobao or JD.com, depriving legitimate affiliates of their commission
  • Tracking injection, which inserts the Google Analytics tracking code into every web page visited by the victim, to silently profile them
  • Security header stripping, which removes security headers like Content-Security-Policy and X-Frame-Options from HTTP responses, exposing users to clickjacking and cross-site scripting attacks
  • Hidden iframe injection, which injects invisible iframes into pages to load URLs from attacker-controlled servers and enable ad and click fraud
  • CAPTCHA bypass, which employs various methods to bypass CAPTCHA challenges and evade bot detection safeguards

“Why would malware need to bypass CAPTCHAs? Because some of its operations, like the hidden iframe injections, trigger bot detection,” the researchers explained. “The malware needs to prove it’s ‘human’ to keep operating.”

Besides probability checks, the add-ons also incorporate time-based delays that prevent the malware from activating until more than six days after installation. These layered evasion techniques make it harder to detect what’s going on behind the scenes.

Cybersecurity

It’s worth emphasizing here that not all the extensions above use the same steganographic attack chain, but all of them exhibit the same behavior and communicate with the same command-and-control (C2) infrastructure, indicating it’s the work of a single threat actor or group that has experimented with different lures and methods.

The development comes merely days after a popular VPN extension for Google Chrome and Microsoft Edge was caught secretly harvesting AI conversations from ChatGPT, Claude, and Gemini and exfiltrating them to data brokers. In August 2025, another Chrome extension named FreeVPN.One was observed collecting screenshots, system information, and users’ locations.

“Free VPNs promise privacy, but nothing in life comes free,” Koi Security said. “Again and again, they deliver surveillance instead.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The best ways to upgrade a Mac setup: Gift guide – 9to5Mac The best ways to upgrade a Mac setup: Gift guide – 9to5Mac
Next Article New Galaxy Ring update promises to fix your battery life frustrations New Galaxy Ring update promises to fix your battery life frustrations
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

A Decade of Modern Code Review Research Shows Gaps in Industry Priorities | HackerNoon
A Decade of Modern Code Review Research Shows Gaps in Industry Priorities | HackerNoon
Computing
Once-in-a-lifetime ‘alien’ comet 3I/ATLAS to sweep past Earth in DAYS
Once-in-a-lifetime ‘alien’ comet 3I/ATLAS to sweep past Earth in DAYS
News
AMD Wants Your Logs To Help Optimize PyTorch & ComfyUI For Strix Halo, Radeon GPUs
AMD Wants Your Logs To Help Optimize PyTorch & ComfyUI For Strix Halo, Radeon GPUs
Computing
5 Scary Things That Could (Realistically) Be in Your Drinking Water
5 Scary Things That Could (Realistically) Be in Your Drinking Water
News

You Might also Like

A Decade of Modern Code Review Research Shows Gaps in Industry Priorities | HackerNoon
Computing

A Decade of Modern Code Review Research Shows Gaps in Industry Priorities | HackerNoon

21 Min Read
AMD Wants Your Logs To Help Optimize PyTorch & ComfyUI For Strix Halo, Radeon GPUs
Computing

AMD Wants Your Logs To Help Optimize PyTorch & ComfyUI For Strix Halo, Radeon GPUs

2 Min Read
China’s NEV Sales Hit 1.395 Million in August, Up 26.8% Year-on-Year · TechNode
Computing

China’s NEV Sales Hit 1.395 Million in August, Up 26.8% Year-on-Year · TechNode

1 Min Read
Vivo Product Manager Reveals X300 with 200MP Zeiss Camera, 6.3-Inch Display · TechNode
Computing

Vivo Product Manager Reveals X300 with 200MP Zeiss Camera, 6.3-Inch Display · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?