Socket’s Risk Analysis Workforce has uncovered a extremely misleading Google Chrome extension designed to steal personal keys and seed phrases from cryptocurrency customers.
The malicious add-on, named “lmΤoken Chromophore” (extension ID bbhaganppipihlhjgaaeeeefbaoihcgi), disguises itself as a innocent hex shade visualizer for builders and digital artists.
Nevertheless, its true goal is to impersonate the broadly used non-custodial pockets model, imToken, and siphon delicate pockets restoration secrets and techniques from unsuspecting victims.
The extension robotically launches its assault upon set up and repeats the method each time a person clicks its icon.
Since its launch in 2016, the reputable imToken pockets has amassed over 20 million customers globally throughout greater than 150 international locations.
As a result of imToken operates strictly as a cell utility and has by no means formally launched a Chrome extension, it represents a major goal for risk actors exploiting model recognition.
Socket’s Risk Analysis Workforce has additionally uncovered that the malicious storefront itemizing leverages this precise vulnerability, presenting faux 5-star person opinions and official wallet-themed branding imagery to construct speedy, unwarranted belief.
It additionally features a privateness coverage claiming no knowledge assortment to look reputable earlier than a sufferer even inspects the code.
Technical Breakdown of Phishing
The risk actors behind this marketing campaign rely closely on subtle evasion strategies to bypass automated detection instruments and guide human scrutiny.
As an alternative of housing apparent native theft logic inside the extension itself, the malware capabilities purely as a light-weight browser redirector.
Upon set up, the extension’s background JavaScript silently retrieves a vacation spot URL from a hardcoded exterior JSONKeeper configuration endpoint.
The sufferer is then immediately redirected to a risk actor-controlled phishing website hosted on a misleading lookalike area, chroomewedbstorre-detail-extension.com.
To additional the deception, the attackers make the most of mixed-script Unicode homoglyphs to bypass easy textual content matching and URL-based safety filters.
The phishing touchdown web page shows the title “іmΤоken” relatively than “imToken,” substituting normal Latin characters with visually an identical Cyrillic and Greek letters.
As soon as on the phishing web page, the person is offered with a extremely convincing pockets import interface that completely mirrors the actual utility.

token.im website as a decoy after the pockets secret has already been collected. (Supply: Socket)Victims are prompted to straight enter both their 12 or 24-word seed phrase or their plaintext personal key into the risk actor’s infrastructure.
Supplying both of those vital secrets and techniques grants the attackers speedy, complete management over the related cryptocurrency funds.
To make sure the sufferer stays solely unaware of the continuing theft, the phishing workflow seamlessly transitions right into a faux native password setup display screen.
This step completely mimics reputable onboarding habits and collects a further credential for potential future use.
Lastly, the web page shows a bogus pockets improve loading display screen earlier than quietly redirecting the person to the reputable token.im web site.
This intelligent handoff serves as a ultimate decoy, leaving the sufferer below the misunderstanding that they efficiently interacted with official imToken software program.
Indicators and Mitigation Methods
Safety analysts should stay constantly vigilant towards browser extensions that execute distant configurations or unexpectedly open exterior domains upon set up.
As a result of these attackers make the most of off-box management mechanisms, the underlying risk infrastructure could be simply pivoted or retargeted without having to replace the extension itself.
Key Indicators of Compromise (IoCs) embrace:
- Malicious Extension ID: bbhaganppipihlhjgaaeeeefbaoihcgi
- Malicious Extension Identify: lmΤoken Chromophore
- Major Phishing Area: chroomewedbstorre-detail-extension.com
- Configuration Endpoint: jsonkeeper.com/b/KUWNE
To successfully mitigate these safety dangers, organizations and people should deal with all browser extensions as high-risk third-party software program.
Directors ought to aggressively prohibit extension installations inside delicate browser profiles and strictly confirm all cryptocurrency-related software program by way of official vendor distribution channels.
If any person has mistakenly entered their seed phrase, personal key, or pockets password right into a suspicious browser web page, the pockets have to be thought-about solely compromised.
Affected customers should instantly switch all remaining digital belongings to a newly generated pockets with recent cryptographic keys earlier than the attackers drain the funds.
Observe us on Google Information, LinkedIn, and X to Get Immediate Updates and Set GBH as a Most popular Supply in Google.

