False Chrome Extension Stealing Analysis

6/12/2024, 3:30:24 PM
Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.

Background

On March 1, 2024, according to Twitter user @doomxbt, there was an abnormal situation with their Binance account, with funds suspected to have been stolen:

(https://x.com/doomxbt/status/1763237654965920175)

Initially, this incident didn’t attract much attention. However, on May 28, 2024, Twitter user @Tree_of_Alpha analyzed and found that the victim, @doomxbt, likely installed a malicious Aggr extension from the Chrome Web Store, which had many positive reviews (we didn’t directly confirm with the victim)! This extension can steal all cookies from websites visited by users, and two months ago, someone paid influential individuals to promote it.

(https://x.com/Tree_of_Alpha/status/1795403185349099740)

In the past few days, the attention on this incident has increased. Credentials of victims logging in were stolen, and subsequently, hackers managed to steal cryptocurrency assets from the victims by brute-forcing. Many users have consulted the SlowMist security team regarding this issue. Next, we will analyze this attack event in detail to sound the alarm for the crypto community.

Analysis

Firstly, we need to find this malicious extension. Although Google has already removed the malicious extension, we can still access some historical data through snapshot information.

After downloading and analyzing the extension, we found several JS files in the directory: background.js, content.js, jquery-3.6.0.min.js, and jquery-3.5.1.min.js.

During static analysis, we observed that background.js and content.js do not contain overly complex code, nor do they have any obvious suspicious code logic. However, in background.js, we found a link to a website, and the plugin collects data and sends it to https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

By analyzing the manifest.json file, we can see that background.js uses /jquery/jquery-3.6.0.min.js, and content.js uses /jquery/jquery-3.5.1.min.js. Let’s focus on analyzing these two jQuery files.

We have discovered suspicious malicious code in jquery/jquery-3.6.0.min.js. The code processes browser cookies into JSON format and sends them to the site: https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

After static analysis, in order to more accurately analyze the behavior of the malicious extension in sending data, we begin by installing and debugging the extension. (Note: Analysis should be conducted in a completely new testing environment where no accounts are logged in, and the malicious site should be changed to a controlled one to avoid sending sensitive data to the attacker’s server.)

Once the malicious extension is installed in the testing environment, open any website, such as google.com, and observe the network requests made by the malicious extension in the background. We observed that the cookies data from Google is being sent to an external server.

We also observed the cookies data sent by the malicious extension on the Weblog service.

At this point, if attackers gain access to user authentication, credentials, etc., and utilize browser extension cookie hijacking, they can conduct a replay attack on certain trading websites, stealing users’ cryptocurrency assets.

Let’s analyze the malicious link again: https[:]//aggrtrade-extension[.]com/statistics_collection/index[.]php.

Domain involved: aggrtrade-extension[.]com

Parse the domain name information in the above picture:

.ru indicates that it is likely a typical user from the Russian-speaking region, suggesting a high probability of involvement by Russian or Eastern European hacker groups.

Attack Timeline:

Analyzing the malicious website mimicking AGGR (aggr.trade), aggrtrade-extension[.]com, we discovered that hackers began planning the attack three years ago.

4 months ago, hackers deployed the attack:

According to the InMist threat intelligence cooperation network, we found that the hacker’s IP is located in Moscow, utilizing a VPS provided by srvape.com. Their email is aggrdev@gmail.com.

After successfully deploying, the hacker began promoting on Twitter, waiting for unsuspecting victims to fall into the trap. As for the rest of the story, it’s well-known – some users installed the malicious extension and subsequently fell victim to theft.

The following image is AggrTrade’s official warning:

Summary

The SlowMist security team advises all users that the risk of browser extensions is nearly as significant as running executable files directly. Therefore, it’s crucial to carefully review before installing. Also, be cautious of those who send you private messages. Nowadays, hackers and scammers often impersonate legitimate and well-known projects, claiming to offer sponsorship or promotion opportunities, targeting content creators for scams. Finally, when navigating the blockchain’s dark forest, always maintain a skeptical attitude to ensure that what you install is secure and not susceptible to exploitation by hackers.

Statement:

  1. This article is reproduced from [慢雾科技], the original title is “Wolf in Sheep’s Clothing | Fake Chrome Extension Theft Analysis”, the copyright belongs to the original author [Mountain&Thinking@Slow Mist Security Team], if you have any objection to the reprint, please contact Gate Learn Team, the team will handle it as soon as possible according to relevant procedures.

  2. Disclaimer: The views and opinions expressed in this article represent only the author’s personal views and do not constitute any investment advice.

  3. Other language versions of the article are translated by the Gate Learn team, not mentioned in Gate.io, the translated article may not be reproduced, distributed or plagiarized.

Share

Crypto Calendar

Project Updates
Etherex will launch the token REX on August 6.
REX
22.27%
2025-08-06
Rare Dev & Governance Day in Las Vegas
Cardano will host the Rare Dev & Governance Day in Las Vegas, from August 6 to 7, featuring workshops, hackathons and panel discussions focused on technical development and governance topics.
ADA
-3.44%
2025-08-06
Blockchain.Rio in Rio De Janeiro
Stellar will participate in the Blockchain.Rio conference, scheduled to be held in Rio de Janeiro, from August 5 to 7. The program will include keynotes and panel discussions featuring representatives of the Stellar ecosystem in collaboration with partners Cheesecake Labs and NearX.
XLM
-3.18%
2025-08-06
Webinar
Circle has announced a live Executive Insights webinar titled “The GENIUS Act Era Begins”, scheduled for August 7, 2025, at 14:00 UTC. The session will explore the implications of the newly passed GENIUS Act—the first federal regulatory framework for payment stablecoins in the United States. Circle’s Dante Disparte and Corey Then will lead the discussion on how the legislation impacts digital asset innovation, regulatory clarity, and the US’s leadership in global financial infrastructure.
USDC
-0.03%
2025-08-06
AMA on X
Ankr will host an AMA on X on August 7th at 16:00 UTC, focusing on DogeOS’s work in building the application layer for DOGE.
ANKR
-3.23%
2025-08-06

Related Articles

Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
6/24/2024, 1:39:17 AM
The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
12/27/2023, 7:44:05 AM
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
6/13/2024, 8:23:51 AM
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
1/4/2024, 4:01:13 PM
What Is Ethereum 2.0? Understanding The Merge
Intermediate

What Is Ethereum 2.0? Understanding The Merge

A change in one of the top cryptocurrencies that might impact the whole ecosystem
1/18/2023, 2:25:24 PM
What is Tronscan and How Can You Use it in 2025?
Beginner

What is Tronscan and How Can You Use it in 2025?

Tronscan is a blockchain explorer that goes beyond the basics, offering wallet management, token tracking, smart contract insights, and governance participation. By 2025, it has evolved with enhanced security features, expanded analytics, cross-chain integration, and improved mobile experience. The platform now includes advanced biometric authentication, real-time transaction monitoring, and a comprehensive DeFi dashboard. Developers benefit from AI-powered smart contract analysis and improved testing environments, while users enjoy a unified multi-chain portfolio view and gesture-based navigation on mobile devices.
5/22/2025, 3:13:17 AM
Start Now
Sign up and get a
$100
Voucher!