Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsMalicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse
Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse
Cybersecurity

Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse

•January 13, 2026
0
GBHackers On Security
GBHackers On Security•Jan 13, 2026

Companies Mentioned

MEXC

MEXC

Socket.IO

Socket.IO

Telegram

Telegram

YouTube

YouTube

Google

Google

GOOG

X (formerly Twitter)

X (formerly Twitter)

Why It Matters

Stealing API keys with withdrawal rights gives cybercriminals direct, automated access to crypto funds, magnifying financial loss potential across the exchange ecosystem. The attack demonstrates a new vector that sidesteps traditional password‑based defenses, urging platforms and users to tighten API security.

Key Takeaways

  • •Chrome extension steals MEXC API keys with withdrawal rights.
  • •Extension hides withdrawal permission checkbox via CSS manipulation.
  • •Credentials sent to attacker‑controlled Telegram bot.
  • •Attack bypasses 2FA, exploits authenticated browser sessions.
  • •Users urged to revoke keys and remove extension.

Pulse Analysis

The rise of browser‑based malware targeting cryptocurrency exchanges reflects attackers’ shift toward harvesting long‑lived API credentials rather than passwords. Unlike one‑time login tokens, API keys often grant unrestricted trading and withdrawal capabilities, making them a high‑value prize for threat actors. By embedding malicious scripts within a seemingly legitimate Chrome extension, cybercriminals can infiltrate an authenticated session without triggering typical security alerts, turning everyday trading tools into covert data‑stealing conduits.

Technical analysis reveals that the MEXC API Automator leverages Manifest V3 permissions to inject code on the exchange’s API‑management page. It programmatically selects all permission checkboxes, then applies CSS tricks and a mutation observer to conceal the withdrawal option from the user’s view. Once the exchange generates the access and secret keys, the extension captures them and forwards the pair via an HTTPS POST to a Telegram bot identified by a hard‑coded token. This exfiltration method bypasses two‑factor authentication, as the attacker only needs the user’s post‑2FA session to complete the theft. The same “SwapSushi” branding across X, YouTube, and malicious domains suggests a coordinated campaign capable of replicating this playbook across other platforms.

For exchanges and traders, the incident underscores the necessity of layered API security. Exchanges should enforce granular permission defaults, require explicit user confirmation for withdrawal rights, and provide real‑time alerts for newly created keys. Users must audit installed extensions, revoke all unused API keys, and employ IP whitelisting or withdrawal limits where possible. As threat actors refine browser‑based credential harvesting, the industry must evolve beyond password hygiene, integrating behavioral analytics and stricter extension vetting to protect billions in digital assets.

Malicious Chrome Extension Steals Wallet Credentials, Enables Automated Trading Abuse

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...