By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
Computing

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

News Room
Last updated: 2026/01/13 at 12:50 PM
News Room Published 13 January 2026
Share
Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
SHARE

Jan 13, 2026Ravie LakshmananWeb Security / Online Fraud

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform.

The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still available on the Chrome Web Store as of writing. It was first published on September 1, 2025, by a developer named “jorjortan142.”

“The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor,” Socket security researcher Kirill Boychenko said in an analysis.

According to the Chrome Web Store listing, the web browser add-on is described as an extension that “simplifies connecting your trading bot to the MEXC exchange” by generating the API keys with the necessary permissions on the management page, including to facilitate trading and withdrawals.

Cybersecurity

In doing so, the installed extension enables a threat actor to control any MEXC account accessed from the compromised browser, allowing them to execute trades, perform automated withdrawals, and even drain the wallets and balances reachable through the service.

“In practice, as soon as the user navigates to MEXC’s API management page, the extension injects a single content script, script.js, and begins operating inside the already authenticated MEXC session,” Socket added. To achieve this, the extension checks if the current URL contains the string “/user/openapi,” which refers to the API key management page.

The script then programmatically creates a new API key and ensures that withdrawal capability is enabled. At the same time, it tampers with the page’s user interface to give the impression to the user that the withdrawal permission has been disabled. As soon as the process to generate the Access Key and Secret Key is complete, the script extracts both the values and transmits them to a hard-coded Telegram bot under the threat actor’s control using an HTTPS POST request.

The threat poses a severe risk, as it remains active as long as the keys are valid and not revoked, granting the attackers unfettered access to the victim’s account even if they end up uninstalling the extension from the Chrome browser.

“In effect, the threat actor uses the Chrome Web Store as the delivery mechanism, the MEXC web UI as the execution environment, and Telegram as the exfiltration channel,” Boychenko noted. “The result is a purpose-built credential-stealing extension that targets MEXC API keys at the moment they are created and configured with full permissions.”

The attack is made possible by the fact that it leverages an already authenticated browser session to realize its goals, thereby obviating the need for obtaining a user’s password or bypassing authentication protections.

Cybersecurity

It’s currently not clear who is behind the operation, but a reference to “jorjortan142” points to an X handle with the same name that links to a Telegram bot named SwapSushiBot, which is also promoted across TikTok and YouTube. The YouTube channel was created on August 17, 2025.

“By hijacking a single API workflow inside the browser, threat actors can bypass many traditional controls and go straight for long lived API keys with withdrawal rights,” Socket said. “The same playbook can be readily adapted to other exchanges, DeFi dashboards, broker portals, and any web console that issues tokens in session, and future variants are likely to introduce heavier obfuscation, request broader browser permissions, and bundle support for multiple platforms into a single extension.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The  Trillion AI Supercycle Opportunity The $3 Trillion AI Supercycle Opportunity
Next Article Verizon gets FCC permission to end 60-day phone unlocking rule Verizon gets FCC permission to end 60-day phone unlocking rule
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Can an early Pixel 10a release with a new colour save the rumoured boring update
Can an early Pixel 10a release with a new colour save the rumoured boring update
Gadget
When A/B Tests Aren’t Possible, Causal Inference Can Still Measure Marketing Impact | HackerNoon
When A/B Tests Aren’t Possible, Causal Inference Can Still Measure Marketing Impact | HackerNoon
Computing
‘Great Comet of 2026’ spotted by astronomers – when to see it with naked eye
‘Great Comet of 2026’ spotted by astronomers – when to see it with naked eye
News
Will Seahawks fans have reason to cheer against 49ers? Stadium cameras will capture the reaction
Will Seahawks fans have reason to cheer against 49ers? Stadium cameras will capture the reaction
Computing

You Might also Like

When A/B Tests Aren’t Possible, Causal Inference Can Still Measure Marketing Impact | HackerNoon
Computing

When A/B Tests Aren’t Possible, Causal Inference Can Still Measure Marketing Impact | HackerNoon

10 Min Read
Will Seahawks fans have reason to cheer against 49ers? Stadium cameras will capture the reaction
Computing

Will Seahawks fans have reason to cheer against 49ers? Stadium cameras will capture the reaction

3 Min Read
JPEG-XL Image Support Returns To Latest Chrome / Chromium Code
Computing

JPEG-XL Image Support Returns To Latest Chrome / Chromium Code

1 Min Read

The Ultimate Creator Event Guide (2026 Edition) |

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?