Skip to content

Firefox Extensions

Evidence: Firefox Extensions
Description: Collect Firefox Extensions (Addons)
Category: Applications
Platform: windows
Short Name: fext
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Firefox extensions (add-ons) enhance browser functionality but can pose significant security risks. Malicious extensions can steal credentials, inject ads, track browsing activity, exfiltrate data, and modify web content. Understanding installed extensions is crucial for detecting browser-based attacks and unauthorized access.

This collector gathers structured data about firefox extensions.

FieldDescriptionExample
ExtensionIDExtension IDExample value
SyncGUIDSync GUIDExample value
VersionVersionExample value
UsernameUsernameExample value
TypeTypeExample value
NameNameExample value
DescriptionDescriptionExample value
VisibleVisibletrue
ActiveActivetrue
UserDisabledUser Disabledtrue
AppDisabledApp Disabledtrue
PathPathExample value
DefaultLocaleDefault LocaleExample value
HiddenHiddentrue
InstallTelemetryInfoInstall Telemetry InfoExample value
LocationLocationExample value
ManifestVersionManifest Version123
OptionsURLOptions URLExample value
OptionsTypeOptions Type123
SourceURISource URIExample value
SignedStateSigned State123
IncognitoIncognitoExample value
UserPermissionsUser PermissionsExample value
OptionalPermissionsOptional PermissionsExample value
InstallDateInstall Date2023-10-15 14:30:25+03:00
UpdateDateUpdate Date2023-10-15 14:30:25+03:00
SignedDateSigned Date2023-10-15 14:30:25+03:00

This collector parses Firefox extensions.json and addons.json files from user profiles to extract installed extension information including names, IDs, versions, descriptions, permissions, and installation sources.

Firefox extension data provides insight into potential compromise vectors and data exfiltration paths. Malicious or suspicious extensions may indicate phishing attacks, credential theft, adware infections, or privacy violations. This evidence helps identify attack entry points, persistence mechanisms, and unauthorized browser modifications.