GhostPoster Malware Hides in Firefox Extension Logos, Infects 50,000 Users
Security researchers uncover sophisticated steganography attack concealing malicious JavaScript within PNG logo files of 17 Firefox browser extensions.
Security researchers at Koi have uncovered a sophisticated malware campaign that compromised 17 Firefox browser extensions, affecting more than 50,000 users through a novel technique that hides malicious code within the PNG logo files of seemingly legitimate add-ons.
The operation, dubbed "GhostPoster," demonstrates how threat actors continue to find creative ways to evade detection systems while maintaining persistent access to victim browsers.
A Creative Concealment Technique
The attack leverages steganography—the practice of hiding information within other data—to embed malicious JavaScript directly inside the PNG image files used as extension logos. When the compromised extensions load, the malware parses these image files searching for specific markers containing "===" to extract and execute the hidden JavaScript payload.
This technique is particularly clever because security scanning tools typically focus on JavaScript files and manifest configurations when reviewing browser extensions. Image files are often overlooked or only scanned for known malware signatures, not for embedded code hidden within pixel data.
Multi-Stage Infection Chain
The GhostPoster malware employs a sophisticated multi-stage infection process designed to evade detection:
Stage 1: Delayed Activation After installation, the malware remains dormant for 48 hours before attempting to contact command-and-control servers. This delay helps evade automated analysis systems that typically monitor extensions for only short periods after installation.
Stage 2: Probability-Based Payload Delivery The loader contacts external servers at domains including "www.liveupdt[.]com" and "www.dealctr[.]com" to retrieve additional payloads. However, payloads are only delivered approximately 10% of the time, further complicating analysis efforts.
Stage 3: Encryption and Obfuscation Retrieved payloads use multiple layers of protection including base64 encoding, case-swapping obfuscation, and XOR encryption derived from the extension's unique runtime ID.
Affected Extensions
The compromised add-ons impersonated legitimate productivity and utility tools that users would reasonably trust:
- VPN applications (Free VPN, Global VPN - Free Forever)
- Screenshot and productivity utilities
- Translation tools (multiple Google Translate variants)
- Media services (Free MP3 Downloader, LibreTV)
- Privacy tools (Dark Reader Dark Mode, Ad Stop - Best Ad Blocker)
The irony of an ad blocker extension being used to conduct ad fraud operations underscores how attackers target the very users most concerned about their online privacy and security.
Monetization Through Multiple Channels
Once fully activated, the GhostPoster toolkit enables four primary monetization methods:
Affiliate Hijacking: The malware intercepts e-commerce links, particularly targeting major Asian platforms like Taobao and JD.com, redirecting affiliate commissions to attacker-controlled accounts.
Tracking Injection: Every website visited by infected users has Google Analytics tracking codes injected, allowing attackers to build detailed profiles of browsing behavior for sale or targeted advertising.
Security Header Stripping: The malware removes protective HTTP headers including Content Security Policy (CSP) and X-Frame-Options, making infected users vulnerable to cross-site scripting and clickjacking attacks.
Ad Fraud Operations: Through invisible, self-deleting iframes, the malware loads attacker-controlled URLs to generate fraudulent ad impressions and clicks.
CAPTCHA Bypass Capabilities
Perhaps most concerning, the toolkit includes three distinct CAPTCHA circumvention techniques, allowing automated operations to continue even when protective measures attempt to block suspicious activity. This capability suggests the attackers have invested significant resources in maintaining persistent access to victim browsers.
Mozilla's Response
Mozilla has removed all identified malicious extensions from the Firefox Add-ons repository and updated automated detection systems to identify similar attack patterns. However, users who installed the extensions before removal may still be infected.
Protecting Yourself
For potentially affected users:
- Review installed extensions at
about:addonsand remove any matching the affected list - Clear browser data including cookies and cached content
- Review recent account activity for suspicious logins or transactions
- Consider resetting browser to default settings
General extension hygiene:
- Only install extensions from verified publishers with established track records
- Regularly audit installed extensions and remove those no longer needed
- Be skeptical of extensions that request broad permissions
- Check extension reviews and user counts, though note that popularity alone does not guarantee safety
The GhostPoster campaign demonstrates that browser extensions remain an attractive attack vector for threat actors. As browsers continue to serve as the gateway to cloud applications and sensitive data, maintaining vigilance over installed extensions has become as important as traditional endpoint security.
Related Articles
SANS Analyst Tracks Malware Using Recycled PNG Payload
Xavier Mertens discovers 846 images reusing the same Base64 steganography technique to deliver .NET malware via Equation Editor exploits. Here's how defenders can hunt for copycats.
Feb 18, 2026XWorm RAT Hides in PNG Image via Steganography Attack
SANS researcher uncovers multi-stage malware attack hiding XWorm payload inside a legitimate travel website image using steganography and obfuscated batch scripts.
Feb 4, 2026Matanbuchus 3.0 Loader Delivers AstarionRAT in Hands-On Intrusion
Huntress responds to ClickFix intrusion deploying Matanbuchus 3.0 and custom AstarionRAT. Attackers achieved lateral movement within 40 minutes.
Feb 25, 2026PromptSpy: First Android Malware Using Gemini AI at Runtime
ESET discovers PromptSpy, the first Android malware weaponizing Google's Gemini AI to maintain persistence by analyzing UI and generating real-time tap instructions to stay pinned in recent apps.
Feb 21, 2026