Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Mozilla Sounds Alarm: Phishing Campaign Targets Add-on Developers


Mozilla has issued a warning to browser extension developers, alerting them to an active phishing campaign targeting accounts on its official AMO (addons.mozilla.org) repository. The threat actor is impersonating the AMO team, claiming that targeted developer accounts require updates to maintain access to development features.

  • Mozilla has issued a warning about an active phishing campaign targeting developer accounts on its official AMO repository.
  • The threat actor is impersonating the AMO team and asks developers to update their accounts to maintain access to development features.
  • Developers are advised to exercise extreme caution, verify email authenticity, and not click on links embedded in suspicious emails.
  • Mozilla urges developers to navigate directly to official websites and enter login credentials only on secure domains.
  • The phishing campaign highlights the ongoing cat-and-mouse game between cybersecurity professionals and threat actors.
  • Developers should stay informed and take proactive steps to protect themselves against emerging threats.



  • Mozilla has issued a warning to browser extension developers, alerting them to an active phishing campaign targeting accounts on its official AMO (addons.mozilla.org) repository. The threat actor is impersonating the AMO team, claiming that targeted developer accounts require updates to maintain access to development features.

    According to Mozilla's advisory, these phishing emails typically state a message similar to "Your Mozilla Add-ons account requires an update to continue accessing developer features." To secure their accounts, developers are advised to exercise extreme caution and scrutiny when receiving such emails. This includes verifying if the email is sent from a Mozilla domain (firefox.com, mozilla.org, mozilla.com, or their subdomains), passing standard email authentication checks (including SPF, DKIM, and DMARC), and not clicking on links embedded in suspicious emails.

    Mozilla also urges developers to navigate directly to its websites rather than following email links, and only enter their login credentials on official Mozilla or Firefox domains. Furthermore, the company has identified and removed hundreds of extensions, including fraudulent cryptocurrency wallets, over the past few years. However, it is unclear whether any developer accounts have already been successfully compromised as a result of this phishing campaign.

    The warning comes after last month's announcement that Mozilla's Add-ons Operations team launched a new security feature to help block malicious Firefox extensions designed to drain cryptocurrency wallets. The new feature aims to prevent such malicious activities and protect users from potential financial losses. However, it appears that the threat actor is adapting to these measures by resorting to phishing attacks.

    Andreas Wagner, the Add-ons Operations Manager who oversees content security and review efforts for addons.mozilla.org (AMO), stated that Mozilla has been vigilant in identifying and removing malicious extensions. Despite this, cybercriminals continue to find ways to exploit vulnerabilities and steal sensitive information. In 2024, attackers stole $494 million worth of cryptocurrency through wallet-draining attacks affecting over 300,000 wallet addresses.

    The surge in phishing campaigns targeting developer accounts highlights the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. As security measures become more sophisticated, attackers adapt and evolve their tactics to evade detection. This scenario underscores the importance of staying vigilant and taking proactive steps to protect sensitive information.

    In light of this warning, it is essential for browser extension developers to exercise extreme caution when receiving emails claiming to be from Mozilla or AMO. By verifying email authenticity and adhering to best practices, such as navigating directly to official websites and entering login credentials on secure domains, developers can significantly reduce the risk of falling victim to phishing attacks.

    The incident serves as a reminder that cybersecurity threats are an ever-evolving landscape, requiring continuous vigilance and adaptation from both individuals and organizations. As the threat landscape continues to shift, it is crucial for developers to stay informed and take proactive steps to protect themselves against emerging threats.

    In conclusion, Mozilla's warning highlights the ongoing struggle between cybersecurity professionals and threat actors. By understanding the tactics employed by these actors and taking proactive measures to protect sensitive information, individuals can significantly reduce their risk of falling victim to phishing attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Mozilla-Sounds-Alarm-Phishing-Campaign-Targets-Add-on-Developers-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/mozilla-warns-of-phishing-attacks-targeting-add-on-developers/


  • Published: Mon Aug 4 05:14:59 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us