I got an email today that really made my day: "Hi İrem Kuyucu, I recently came across your repository shady on GitHub — truly awesome! With 34 followers and 21 stars, your work is clearly admired."
Finally someone appreciates my Monero ransomware implementation! He even built a browser extension called "Coupongogo" and wanted me to try it.
Then I looked at the code. Turns out my new "fan" wasn't impressed by my coding skills. He was scouting for his next victim.
The extension is remote-controlled malware operated from Chinese servers (oversea[dot]mimixiaoke[dot]com). Right now it steals shopping data and injects affiliate links. But buried in the code? Pre-configured targeting for 18+ cryptocurrency exchanges.
Here's what happens when they flip the switch: The extension starts monitoring your Coinbase, Binance, or Kraken sessions in real-time. When you initiate a withdrawal, it can inject fake confirmation dialogs that look identical to the exchange's real UI. When you paste a destination wallet address, it can use the clipboardWrite permission to silently swap it with the attacker's address. When you enter a withdrawal amount, it logs that data and sends it to their server. The *://*/* permission means they can do this on ANY website, not just the exchanges they've pre-configured.
Nice try "Laplas"! But complimenting my ransomware project while trying to get me to install a crypto stealer is delusional 💀