GhostPoster Campaign: How Malicious Firefox Extensions Hide Code in Logo Files
Security researchers discover 17 Firefox extensions using PNG steganography to hide multi-stage malware affecting 50,000+ users.
Security researchers discover 17 Firefox extensions using PNG steganography to hide multi-stage malware affecting 50,000+ users.
Security researchers have identified a sophisticated malware campaign affecting 17 Firefox browser extensions with a combined installation base exceeding 50,000 users. The investigation, conducted by the Koi, uncovered a multi-stage attack that embeds malicious JavaScript code within PNG image files—specifically, extension logo graphics—to evade detection by automated security scanners and manual code reviews. The flagship extension in this campaign, Free VPN Forever, has remained available on the Firefox Add-ons marketplace since September 2025 with over 16,000 installations as of publication.
The threat was detected when their risk engine Wings flagged anomalous file-reading patterns in Free VPN Forever. Rather than simply displaying its logo file, the extension was executing a data extraction routine on the PNG bytes. This discovery led to the identification of a coordinated infrastructure spanning multiple extensions that promise VPN services, translation tools, weather forecasts, and ad-blocking capabilities while delivering comprehensive browser surveillance and control mechanisms.
The Koi research team documented a sophisticated four-stage infection process that demonstrates operational maturity and deliberate evasion design:
The investigation identified several specific technical artifacts and operational signatures:
According to the research, the campaign's effectiveness stems from systematic removal of browser-native security protections. The malware actively strips Content-Security-Policy and X-Frame-Options headers from every HTTP response across all visited domains. These headers constitute fundamental defense mechanisms against clickjacking and cross-site scripting attacks. By removing them at the response level before the browser processes page content, the extensions eliminate protections that web developers and security teams rely upon.
The research highlights that this header stripping occurs silently across the entire browsing session, affecting banking sites, email platforms, and any other domains the user visits. The malware maintains persistent access to inject arbitrary code into every page, enabling affiliate link manipulation on e-commerce platforms (specifically Taobao and JD.com according to the investigation), invisible iframe creation for ad fraud operations, and comprehensive tracking of user behavior across domains.
The CAPTCHA bypass mechanisms documented in the research serve a specific operational purpose: the malware's iframe injection and automated link manipulation trigger bot detection systems on target platforms. The extension implements multiple bypass techniques, including invisible overlay simulation, external solver integration, and Baidu authentication status verification, to maintain its fraudulent operations without triggering security alerts.
The Koi research team's findings indicate several immediate actions for stakeholders based on the documented attack vectors:
This investigation was conducted by the Koi research team, whose risk engine system Wings detected the initial anomalous file-reading patterns in the Free VPN Forever extension. The research involved reverse-engineering the multi-stage infection chain, documenting the steganographic encoding techniques, analyzing network communications with command-and-control infrastructure, and identifying 16 additional extensions sharing the same backend servers. The team continues to monitor the campaign's infrastructure for additional extensions and payload updates as the malware remains active on the Firefox Add-ons marketplace.
The GhostPoster campaign represents a maturation of browser extension-based threats through the integration of steganographic concealment, staged payload delivery, and systematic security control circumvention. The research demonstrates that the primary risk extends beyond the initial infection vector—the ability to update payloads remotely, strip security headers across all browsing activity, and maintain persistent code injection capabilities provides attackers with comprehensive browser control that can be weaponized for purposes beyond the currently observed affiliate fraud and tracking operations. With affected extensions remaining available for installation and the infrastructure actively serving payloads to existing victims, the documented techniques establish a blueprint for future campaigns targeting browser extension ecosystems.
Access Koi's complete technical analysis and indicators of compromise in the full report below.