Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100个字以内,而且不需要特定的开头,直接写描述即可。 首先,我快速浏览一下文章内容。这篇文章讲的是一个恶意的Google Chrome扩展程序,它伪装成一个自动化交易工具,实际上是在窃取MEXC交易所的API密钥。这个扩展程序名为MEXC API Automator,下载量有29次,并且还在Chrome商店上架。它通过创建新的API密钥并隐藏权限,将密钥发送到Telegram机器人中,从而控制用户的账户进行交易和提款。 接下来,我需要提取关键信息:恶意扩展、伪装功能、窃取API密钥、影响范围、危害等。然后把这些信息浓缩成一句话,确保不超过100个字。 可能的结构是:恶意Chrome扩展伪装成工具窃取MEXC API密钥,允许攻击者控制账户进行交易和提款。 检查一下字数是否符合要求,并且确保信息准确无误。 </think> 恶意Chrome扩展伪装成自动化交易工具,实则窃取MEXC交易所API密钥并控制用户账户进行交易和提款。 2026-1-13 17:22:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Web Security / Online Fraud

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform.

The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still available on the Chrome Web Store as of writing. It was first published on September 1, 2025, by a developer named "jorjortan142."

"The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor," Socket security researcher Kirill Boychenko said in an analysis.

According to the Chrome Web Store listing, the web browser add-on is described as an extension that "simplifies connecting your trading bot to the MEXC exchange" by generating the API keys with the necessary permissions on the management page, including to facilitate trading and withdrawals.

Cybersecurity

In doing so, the installed extension enables a threat actor to control any MEXC account accessed from the compromised browser, allowing them to execute trades, perform automated withdrawals, and even drain the wallets and balances reachable through the service.

"In practice, as soon as the user navigates to MEXC's API management page, the extension injects a single content script, script.js, and begins operating inside the already authenticated MEXC session," Socket added. To achieve this, the extension checks if the current URL contains the string "/user/openapi," which refers to the API key management page.

The script then programmatically creates a new API key and ensures that withdrawal capability is enabled. At the same time, it tampers with the page's user interface to give the impression to the user that the withdrawal permission has been disabled. As soon as the process to generate the Access Key and Secret Key is complete, the script extracts both the values and transmits them to a hard-coded Telegram bot under the threat actor's control using an HTTPS POST request.

The threat poses a severe risk, as it remains active as long as the keys are valid and not revoked, granting the attackers unfettered access to the victim's account even if they end up uninstalling the extension from the Chrome browser.

"In effect, the threat actor uses the Chrome Web Store as the delivery mechanism, the MEXC web UI as the execution environment, and Telegram as the exfiltration channel," Boychenko noted. "The result is a purpose-built credential-stealing extension that targets MEXC API keys at the moment they are created and configured with full permissions."

The attack is made possible by the fact that it leverages an already authenticated browser session to realize its goals, thereby obviating the need for obtaining a user's password or bypassing authentication protections.

Cybersecurity

It's currently not clear who is behind the operation, but a reference to "jorjortan142" points to an X handle with the same name that links to a Telegram bot named SwapSushiBot, which is also promoted across TikTok and YouTube. The YouTube channel was created on August 17, 2025.

"By hijacking a single API workflow inside the browser, threat actors can bypass many traditional controls and go straight for long lived API keys with withdrawal rights," Socket said. "The same playbook can be readily adapted to other exchanges, DeFi dashboards, broker portals, and any web console that issues tokens in session, and future variants are likely to introduce heavier obfuscation, request broader browser permissions, and bundle support for multiple platforms into a single extension."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/malicious-chrome-extension-steals-mexc.html
如有侵权请联系:admin#unsafe.sh