Mozilla Warns Extension Developers About Phishing Attacks

Mozilla Warns Extension Developers About Phishing Attacks

Mozilla has issued an urgent warning to browser extension developers about an ongoing phishing campaign targeting accounts on the official addons.mozilla.org (AMO) platform. AMO hosts more than 60,000 extensions and 500,000 themes, serving millions of users around the world.


How the Attack Works

The phishing scheme begins with emails impersonating official AMO communications. These messages urge developers to take immediate action—often claiming their access to publishing tools is at risk if they don’t comply.

Example phishing message:

“To continue using developer features, you must update your Mozilla Add-ons account.”

The emails include links that redirect victims to spoofed login pages, designed to steal credentials.


Mozilla’s Recommendations

To protect their accounts, developers are strongly advised to follow these guidelines:

  • Verify sender domains: Legitimate messages come from firefox.com, mozilla.org, or their subdomains.
  • Check email authentication headers: Confirm valid SPF, DKIM, and DMARC records.
  • Avoid clicking links in suspicious emails—navigate directly to official Mozilla sites instead.
  • Enter credentials only on verified Mozilla or Firefox domains.

Additionally, enabling two-factor authentication (2FA) is highly encouraged.


Current Impact

Mozilla has not disclosed how widespread or successful the campaign has been. However, at least one developer confirmed being targeted, as noted in the comments section of the official announcement.

The incident underscores a broader concern for the open-source ecosystem: if a developer’s account is compromised, attackers could push malicious updates to legitimate browser extensions—putting end users at risk.


Final Note

Mozilla’s warning is part of a growing trend in the tech industry, where developer platforms are becoming prime targets for phishing and credential theft. The safest defense remains constant vigilance, proper authentication hygiene, and proactive reporting of suspicious activity.

Read more