False Chrome Extension Stealing Analysis

6/12/2024, 3:30:24 PM
Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.

Background

On March 1, 2024, according to Twitter user @doomxbt, there was an abnormal situation with their Binance account, with funds suspected to have been stolen:

(https://x.com/doomxbt/status/1763237654965920175)

Initially, this incident didn’t attract much attention. However, on May 28, 2024, Twitter user @Tree_of_Alpha analyzed and found that the victim, @doomxbt, likely installed a malicious Aggr extension from the Chrome Web Store, which had many positive reviews (we didn’t directly confirm with the victim)! This extension can steal all cookies from websites visited by users, and two months ago, someone paid influential individuals to promote it.

(https://x.com/Tree_of_Alpha/status/1795403185349099740)

In the past few days, the attention on this incident has increased. Credentials of victims logging in were stolen, and subsequently, hackers managed to steal cryptocurrency assets from the victims by brute-forcing. Many users have consulted the SlowMist security team regarding this issue. Next, we will analyze this attack event in detail to sound the alarm for the crypto community.

Analysis

Firstly, we need to find this malicious extension. Although Google has already removed the malicious extension, we can still access some historical data through snapshot information.

After downloading and analyzing the extension, we found several JS files in the directory: background.js, content.js, jquery-3.6.0.min.js, and jquery-3.5.1.min.js.

During static analysis, we observed that background.js and content.js do not contain overly complex code, nor do they have any obvious suspicious code logic. However, in background.js, we found a link to a website, and the plugin collects data and sends it to https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

By analyzing the manifest.json file, we can see that background.js uses /jquery/jquery-3.6.0.min.js, and content.js uses /jquery/jquery-3.5.1.min.js. Let’s focus on analyzing these two jQuery files.

We have discovered suspicious malicious code in jquery/jquery-3.6.0.min.js. The code processes browser cookies into JSON format and sends them to the site: https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

After static analysis, in order to more accurately analyze the behavior of the malicious extension in sending data, we begin by installing and debugging the extension. (Note: Analysis should be conducted in a completely new testing environment where no accounts are logged in, and the malicious site should be changed to a controlled one to avoid sending sensitive data to the attacker’s server.)

Once the malicious extension is installed in the testing environment, open any website, such as google.com, and observe the network requests made by the malicious extension in the background. We observed that the cookies data from Google is being sent to an external server.

We also observed the cookies data sent by the malicious extension on the Weblog service.

At this point, if attackers gain access to user authentication, credentials, etc., and utilize browser extension cookie hijacking, they can conduct a replay attack on certain trading websites, stealing users’ cryptocurrency assets.

Let’s analyze the malicious link again: https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

Domain involved: aggrtrade-extension[.]com

Parse the domain name information in the above picture:

.ru indicates that it is likely a typical user from the Russian-speaking region, suggesting a high probability of involvement by Russian or Eastern European hacker groups.

Attack Timeline:

Analyzing the malicious website mimicking AGGR (aggr.trade), aggrtrade-extension[.]com, we discovered that hackers began planning the attack three years ago.

4 months ago, hackers deployed the attack:

According to the InMist threat intelligence cooperation network, we found that the hacker’s IP is located in Moscow, utilizing a VPS provided by srvape.com. Their email is aggrdev@gmail.com.

After successfully deploying, the hacker began promoting on Twitter, waiting for unsuspecting victims to fall into the trap. As for the rest of the story, it’s well-known – some users installed the malicious extension and subsequently fell victim to theft.

The following image is AggrTrade’s official warning:

Summary

The SlowMist security team advises all users that the risk of browser extensions is nearly as significant as running executable files directly. Therefore, it’s crucial to carefully review before installing. Also, be cautious of those who send you private messages. Nowadays, hackers and scammers often impersonate legitimate and well-known projects, claiming to offer sponsorship or promotion opportunities, targeting content creators for scams. Finally, when navigating the blockchain’s dark forest, always maintain a skeptical attitude to ensure that what you install is secure and not susceptible to exploitation by hackers.

Statement:

  1. This article is reproduced from [慢雾科技], the original title is “Wolf in Sheep’s Clothing | Fake Chrome Extension Theft Analysis”, the copyright belongs to the original author [Mountain&Thinking@Slow Mist Security Team], if you have any objection to the reprint, please contact Gate Learn Team, the team will handle it as soon as possible according to relevant procedures.

  2. Disclaimer: The views and opinions expressed in this article represent only the author’s personal views and do not constitute any investment advice.

  3. Other language versions of the article are translated by the Gate Learn team, not mentioned in Gate.io, the translated article may not be reproduced, distributed or plagiarized.

Share

Crypto Calendar

Proje Güncellemeleri
Etherex, 6 Ağustos'ta REX token'ını piyasaya sürecek.
REX
22.27%
2025-08-06
Nadir Geliştirici ve Yönetim Günü Las Vegas'ta
Cardano, 6-7 Ağustos tarihleri arasında Las Vegas'ta Rare Dev & Governance Day etkinliği düzenleyecek. Etkinlik, teknik gelişim ve yönetişim konularına odaklanan atölye çalışmaları, hackathonlar ve panel tartışmaları içerecek.
ADA
-3.44%
2025-08-06
Blok Zinciri.Rio Rio de Janeiro'da
Stellar, 5-7 Ağustos tarihlerinde Rio de Janeiro'da gerçekleştirilecek Blockchain.Rio konferansına katılacak. Program, Stellar ekosisteminin temsilcilerini, Cheesecake Labs ve NearX ortakları ile birlikte içeren anahtar konuşmalar ve panel tartışmaları içerecek.
XLM
-3.18%
2025-08-06
Webinar
Circle, 7 Ağustos 2025 tarihinde, UTC 14:00'te "GENIUS Yasası Dönemi Başlıyor" başlıklı bir canlı Yönetici İçgörüleri web semineri düzenleyeceğini duyurdu. Oturum, Amerika Birleşik Devletleri'nde ödeme stablecoin'leri için ilk federal düzenleyici çerçeve olan yeni kabul edilen GENIUS Yasası'nın etkilerini inceleyecek. Circle'ın Dante Disparte ve Corey Then, yasaların dijital varlık inovasyonu, düzenleyici netlik ve ABD'nin küresel finansal altyapıdaki liderliği üzerindeki etkilerini tartışacak.
USDC
-0.03%
2025-08-06
X üzerinde AMA
Ankr, 7 Ağustos'ta UTC 16:00'da X üzerinde bir AMA düzenleyecek ve DogeOS'nin DOGE için uygulama katmanını inşa etme çalışmalarına odaklanacak.
ANKR
-3.23%
2025-08-06

Related Articles

Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
6/24/2024, 1:39:17 AM
The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
12/27/2023, 7:44:05 AM
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
6/13/2024, 8:23:51 AM
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
1/4/2024, 4:01:13 PM
What Is Ethereum 2.0? Understanding The Merge
Intermediate

What Is Ethereum 2.0? Understanding The Merge

A change in one of the top cryptocurrencies that might impact the whole ecosystem
1/18/2023, 2:25:24 PM
What is Tronscan and How Can You Use it in 2025?
Beginner

What is Tronscan and How Can You Use it in 2025?

Tronscan is a blockchain explorer that goes beyond the basics, offering wallet management, token tracking, smart contract insights, and governance participation. By 2025, it has evolved with enhanced security features, expanded analytics, cross-chain integration, and improved mobile experience. The platform now includes advanced biometric authentication, real-time transaction monitoring, and a comprehensive DeFi dashboard. Developers benefit from AI-powered smart contract analysis and improved testing environments, while users enjoy a unified multi-chain portfolio view and gesture-based navigation on mobile devices.
5/22/2025, 3:13:17 AM
Start Now
Sign up and get a
$100
Voucher!