fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Malicious ‘Safepal Wallet’ Firefox Add-on Stole Cryptocurrency

Malicious ‘Safepal Wallet’ Firefox Add-on Stole Cryptocurrency

A malicious Firefox add-on named “Safepal Wallet” scammed users by emptying out their wallets and lived on the Mozilla add-ons store for seven months.

Safepal is a cryptocurrency wallet application capable of securely holding more than 10,000 types of assets, including Bitcoin, Ethereum, and Litecoin.

Although the malicious browser add-on has been taken down, BleepingComputer has seen the phishing website set up by the threat actors is still up.

$4,000 lost to malicious Firefox add-on

“Today I browsed [through] the add-on list of Mozilla Firefox, I was searching for Safepal wallet extension to use my cryptocurrency wallet also in the web browser,” explains a Mozilla add-ons user who goes by the name, Cali

Little did Cali know what was coming for them. A few hours after installing and logging in to the add-on with their real Safepal credentials, the user saw their wallet balance drop to $0.

“I was deep in shock… I saw my last transactions and saw that [$4,000 of my funds] were transferred to another wallet. I could not believe it [was an] add-on that is deployed in the add-on list of Mozilla Firefox,” continues the user in Mozilla’s support forum.

safepal addon page firefox
Fake ‘Safepal Wallet’ add-on on the Mozilla Firefox store (BleepingComputer)

The add-on page for ‘Safepal Wallet’, seen by BleepingComputer, stated the add-on was up since at least February 16th, 2021.

Also Read:

On the same page, the 235 KB add-on touts itself to be a Safepal application that securely “saves private key locally,” along with convincing product images and marketing materials.

To publish an add-on on Mozilla’s website, developers are required to follow a submission process that states submitted add-ons are “subject to review by Mozilla at any time.” But, it isn’t clear to what extent are submissions reviewed with regards to their safety.

Within five days of Cali’s public report of the incident this month, a Mozilla spokesperson responded that they were investigating. The page has since been removed by Mozilla.

Also Read: New Licensing Requirements For Cyber-Security Service Providers in 2022

Although Safepal has official smartphone apps available on both Apple AppStore and Google Play, we are not aware of there being authentic ‘Safepal’ browser extensions.

Thankfully, on Mozilla add-ons store, some users had posted one-star reviews warning others not to download ‘Safepal Wallet’:

safepal fake addon reviews
Safepal fake add-on reviews by users (BleepingComputer)

But, for Cali, it seems a little too late in the game, and the chances of them getting their funds back are bleak.

“I already talked with the police they can do nothing for me. They told me that there is no way they can trace the hacker. The only solution is left for me is maybe some of you can help me out by figuring out who the hacker was and how I can get my funds back,” states the user.

BleepingComputer reached out to Mozilla to learn more about the issue:

“Extension security is important to Mozilla, and our ecosystem continually responds to changing threats,” a Mozilla spokesperson told BleepingComputer.

“Our recent focus has been on limiting the damage malicious extensions can do, helping users discover Recommended Extensions that we vet and monitor, helping users understand the risks that come with installing extensions, and making it easier for users to report potentially malicious extensions to us.”

“When we become aware of add-ons that pose a risk to security and privacy according to our Add-on Policies, we take steps to prevent them from running in Firefox. In this instance, shortly after we became aware of potential abuse by this extension, we took action to block and remove it from the Firefox Add-on store.”

Also Read: A Closer Look: The Personal Information Protection Law in China

“Users should be especially cautious about installing software that might have access to private information or financial resources.”

‘Safepal’ phishing domain still up, collecting recovery phrases

While investigating the malicious Firefox add-on, BleepingComputer came across the phishing domain used by the add-on. This webpage, shown below, was also listed as the “support site” link on the fake add-on’s home page:https://safeuslife.com/tool/

WHOIS records indicate the phishing site was registered in January this year via Namecheap. At the time of writing, the webpage is still live and instructs the victim to key in their “12-word Backup Phrase in the correct order to pair your SafePal Wallet.”

fake 'safepal wallet' restore page
Phishing page entices Safepal wallet user to enter their recovery phrase (BleepingComputer)

But once the recovery phrase is entered and the form is submitted, the page simply refreshes without any noticeable response. The recovery phrase is silently sent to the attacker.

Cryptocurrency wallets, like many online services, use a backup phrase consisting of twelve randomly generated words that can be used for recovering the user’s private key and wallet, should they forget their password. But, the recovery phrase is a crucial secret meant to be used under exceptional circumstances and only on the trusted app or website of the service provider.

A stolen recovery phrase can grant attackers control over your wallet along with the ability to access and transfer funds.

In recent times, cryptocurrency scams are growing, with threat actors are finding innovative and hard-to-detect ways to trick users. Just last week, someone hacked the official Bitcoin.org website and successfully scammed visitors for $17,000.

In previously seen attacks, open-source repositories, including npmPyPI, and GitHub have been abused for spreading both cryptostealing and cryptomining malware.

With the increasing presence of threat actors on online platforms, users should be careful when providing their security phrases or transferring cryptocurrency online.

Mozilla additionally recommends the following steps for assessing the safety of any browser extension:

  1. Ask yourself: Is the extension from a brand or developer that I trust? Does the brand or developer’s official website link to an extension?
  2. Check to see if the developer’s website, blog, or social media activity is consistent with features of the extension
  3. Look at how many other users have installed the extension. Does it have a good star rating and positive reviews?

BleepingComputer has reached out to both Mozilla and Safepal for further comment and we are awaiting their responses. We have also reported the phishing domain in question to Namecheap.

Update, Sep 28th, 00:16: Added statement received from Mozilla after publishing.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us