The threat research team at security research organization Socket recently disclosed a serious malicious Chrome extension incident. A malicious extension called "MEXC API Automator" has been available on the Chrome Web Store since September 1, 2025, secretly generating API keys with withdrawal permissions for user accounts. Even more dangerous, this extension deliberately hides permission prompts, making users completely unaware of what is happening. The generated API keys are then transmitted back to the attacker's controlled Telegram channel, putting user accounts at serious financial risk.



This serves as a reminder to all trading users: it is crucial to download trading tools from official sources, be cautious when granting browser extension permissions, and regularly check your account API key settings. If any anomalies are detected, all suspicious API key permissions should be revoked immediately.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Repost
  • Share
Comment
0/400
FundingMartyrvip
· 01-14 08:00
Another one. How is the defense line in the Chrome Web Store so terrible... It's already 2025 and you're still using this trick? Directly steal the key and send it to Telegram, outrageous.
View OriginalReply0
Rekt_Recoveryvip
· 01-14 07:47
bro this is literally my nightmare scenario... silent API key generation? that's some next level opsec breach. been there, lost there, learned the hard way lmao
Reply0
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)