In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

Become An AI Expert In Just 5 Minutes

If you’re a decision maker at your company, you need to be on the bleeding edge of, well, everything. But before you go signing up for seminars, conferences, lunch ‘n learns, and all that jazz, just know there’s a far better (and simpler) way: Subscribing to The Deep View.

This daily newsletter condenses everything you need to know about the latest and greatest AI developments into a 5-minute read. Squeeze it into your morning coffee break and before you know it, you’ll be an expert too.

Subscribe right here. It’s totally free, wildly informative, and trusted by 600,000+ readers at Google, Meta, Microsoft, and beyond.

Malicious Firefox Extensions Use Steganography to Deliver Hidden Malware

Researchers at Koi Security have uncovered a malicious campaign, dubbed GhostPoster, that abuses the Firefox add-ons ecosystem to distribute browser-based malware. The operation relies on steganography—hiding malicious code inside seemingly harmless extension icons—to evade detection. At least 17 extensions masquerading as VPNs, ad blockers, translators, and weather tools have been identified, with a combined install base of roughly 50,000 users. Once active, the malware enables tracking, monetization abuse, and potential remote code execution.

Context

Browser extensions are widely trusted to enhance functionality and privacy. However, their deep integration into browser internals also makes them an attractive attack surface. Over the past several years, security teams have repeatedly documented malicious extensions abusing update mechanisms, permissions, and marketplace trust signals to persist undetected. GhostPoster represents an escalation in sophistication, using image-based steganography and delayed execution to bypass both automated review systems and user suspicion.

What Happened

Koi Security identified a cluster of Firefox extensions that appeared legitimate but were quietly performing malicious actions. One extension, Free VPN Forever, alone accumulated more than 16,000 installations after being published in September 2025.

Rather than downloading obvious malicious files, the extensions extracted hidden code embedded within their own icon images. After installation, the malware waited several days before activating, significantly reducing the likelihood of detection during initial review or casual use.

Technical Breakdown

The attack chain begins when the extension loads its icon image and scans the raw bytes for a predefined marker. Data hidden after this marker contains a loader, concealed using steganography.

Once triggered, the loader contacts an attacker-controlled command-and-control (C2) server, though only in a small fraction of attempts to avoid traffic-based detection. The retrieved payload is encrypted, decrypted locally, and then re-encrypted for storage within browser data, ensuring persistence.

The malware includes capabilities to:

  • Strip HTTP security headers from all visited sites

  • Inject tracking scripts and hidden iframes

  • Replace affiliate links on e-commerce platforms

  • Profile installed extensions and browsing behavior

  • Maintain a persistent C2 connection for future payload updates

Delayed execution—sometimes exceeding six days—further complicates detection and forensic analysis.

Impact Analysis

While the campaign does not initially deploy destructive malware, its implications are serious. Affected users face:

  • Loss of privacy through continuous behavioral monitoring

  • Increased exposure to clickjacking and cross-site scripting attacks

  • Financial manipulation via hijacked affiliate traffic

  • Elevated risk of future compromise through remotely delivered updates

Because browser extensions operate within trusted contexts, their compromise can undermine otherwise secure browsing environments.

Why It Matters

GhostPoster highlights how trust in extension marketplaces can be exploited at scale. The use of steganography demonstrates that traditional signature-based detection and manual reviews are no longer sufficient. As browsers become central to work, commerce, and identity, malicious extensions represent a persistent and underappreciated risk vector.

Expert Commentary

“These extensions strip your browser’s security headers on every site you visit. They inject code into every page. They maintain a persistent connection to attacker-controlled servers, waiting for instructions,” Koi Security warned. “What runs in your browser tomorrow is entirely up to them.”

Key Takeaways

  • Steganography is now actively used in browser malware delivery

  • Malicious extensions can evade detection for days or weeks

  • Even non-destructive campaigns can enable serious follow-on attacks

  • Extension permissions remain a high-risk trust boundary

  • Users should routinely audit installed extensions and remove unused tools

Keep Reading

No posts found