
CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Become An AI Expert In Just 5 Minutes
If you’re a decision maker at your company, you need to be on the bleeding edge of, well, everything. But before you go signing up for seminars, conferences, lunch ‘n learns, and all that jazz, just know there’s a far better (and simpler) way: Subscribing to The Deep View.
This daily newsletter condenses everything you need to know about the latest and greatest AI developments into a 5-minute read. Squeeze it into your morning coffee break and before you know it, you’ll be an expert too.
Subscribe right here. It’s totally free, wildly informative, and trusted by 600,000+ readers at Google, Meta, Microsoft, and beyond.
Malicious Firefox Extensions Use Steganography to Deliver Hidden Malware

Researchers at Koi Security have uncovered a malicious campaign, dubbed GhostPoster, that abuses the Firefox add-ons ecosystem to distribute browser-based malware. The operation relies on steganography—hiding malicious code inside seemingly harmless extension icons—to evade detection. At least 17 extensions masquerading as VPNs, ad blockers, translators, and weather tools have been identified, with a combined install base of roughly 50,000 users. Once active, the malware enables tracking, monetization abuse, and potential remote code execution.
Context
Browser extensions are widely trusted to enhance functionality and privacy. However, their deep integration into browser internals also makes them an attractive attack surface. Over the past several years, security teams have repeatedly documented malicious extensions abusing update mechanisms, permissions, and marketplace trust signals to persist undetected. GhostPoster represents an escalation in sophistication, using image-based steganography and delayed execution to bypass both automated review systems and user suspicion.
What Happened
Koi Security identified a cluster of Firefox extensions that appeared legitimate but were quietly performing malicious actions. One extension, Free VPN Forever, alone accumulated more than 16,000 installations after being published in September 2025.
Rather than downloading obvious malicious files, the extensions extracted hidden code embedded within their own icon images. After installation, the malware waited several days before activating, significantly reducing the likelihood of detection during initial review or casual use.
Technical Breakdown
The attack chain begins when the extension loads its icon image and scans the raw bytes for a predefined marker. Data hidden after this marker contains a loader, concealed using steganography.
Once triggered, the loader contacts an attacker-controlled command-and-control (C2) server, though only in a small fraction of attempts to avoid traffic-based detection. The retrieved payload is encrypted, decrypted locally, and then re-encrypted for storage within browser data, ensuring persistence.
The malware includes capabilities to:
Strip HTTP security headers from all visited sites
Inject tracking scripts and hidden iframes
Replace affiliate links on e-commerce platforms
Profile installed extensions and browsing behavior
Maintain a persistent C2 connection for future payload updates
Delayed execution—sometimes exceeding six days—further complicates detection and forensic analysis.
Impact Analysis
While the campaign does not initially deploy destructive malware, its implications are serious. Affected users face:
Loss of privacy through continuous behavioral monitoring
Increased exposure to clickjacking and cross-site scripting attacks
Financial manipulation via hijacked affiliate traffic
Elevated risk of future compromise through remotely delivered updates
Because browser extensions operate within trusted contexts, their compromise can undermine otherwise secure browsing environments.
Why It Matters
GhostPoster highlights how trust in extension marketplaces can be exploited at scale. The use of steganography demonstrates that traditional signature-based detection and manual reviews are no longer sufficient. As browsers become central to work, commerce, and identity, malicious extensions represent a persistent and underappreciated risk vector.
Expert Commentary
“These extensions strip your browser’s security headers on every site you visit. They inject code into every page. They maintain a persistent connection to attacker-controlled servers, waiting for instructions,” Koi Security warned. “What runs in your browser tomorrow is entirely up to them.”
Key Takeaways
Steganography is now actively used in browser malware delivery
Malicious extensions can evade detection for days or weeks
Even non-destructive campaigns can enable serious follow-on attacks
Extension permissions remain a high-risk trust boundary
Users should routinely audit installed extensions and remove unused tools

