Investigation • 6–8 min read

150+ Fake Mozilla Extensions — One Backend & Paid Media

Media blamed “Russian bears” for 150+ fake Mozilla extensions. Our findings show Nigerian infrastructure (IP 185.208.156.66), recycled phishing kits, and how paid articles helped spread the myth.

Fake Mozilla Extensions investigation banner

Background

A wave of headlines tied 150+ fake Mozilla extensions to a “Russian trail.” Our volunteer investigation shows these extensions relied on a single backend hosted on 185.208.156.66 — consistent with Nigerian scam infrastructure.

Key Findings

  • Over 150 extensions reused identical low‑quality phishing kits.
  • All communicated with a single backend on 185.208.156.66.
  • Neighboring domains on the same IP: bank scams, crypto scams, fake deliveries.
  • A Telegram ID embedded in the code pointed to a Nigerian operator.
  • Russian groups typically use distributed infra (Cloudflare Workers, Firebase, AWS) — not a single reused backend.

Evidence & Snapshots

Urlscan sample: https://urlscan.io/result/0198e619-7b76-74a0-b581-c2e788879572/. Many domains are dead now; urlscan/WebArchive preserve snapshots of what we reported.

Cloned extensions sharing one backend (only logo/name differ)
Most extensions were simple clones: only the logo and name differed.

Paid Media Problem

A single paid article in a large outlet becomes a seed; hundreds of smaller sites and Telegram channels rewrite/translate it, creating a wall of credibility that hides the truth. Victims stop reporting, investigations stall, and the real operators remain untouched.

Example marketplace listing for paid media placements
There are many platforms openly selling media placements. Prices vary; some offers exclude an ad label.

Our Actions

  • Submitted domains/extensions to Mozilla.
  • Escalated links/evidence to SEAL for faster takedowns.
  • Filed a public notice on ChainAbuse.
  • Injected millions of empty seed phrases to waste attacker resources.
Need a takedown? Send domains/URLs to our bot → https://t.me/PhishDestroy_bot

Disclaimer

We do not accuse any individual or outlet. All facts are open‑source and verifiable. The question is why such narratives are amplified — and who benefits when an unknown “security company” publishes an expensive, inaccurate investigation.

#ThreatIntel #Mozilla #OSINT #Disinformation #PhishDestroy