
Once installed, the malicious code runs every time the browser is loaded. The malware will attempt to seek out stored details for popular banks, and online payment services such as PayPal and eGold. Any captured information is uploaded to a server in Russia.
"Users should be aware of the risks they face if such confidential information is stolen," said Viorel Canja, who heads up BitDefender's anti-virus lab.
A Trojan masquerading as a Firefox plug-in is unusual, but disguising malware as browser and system add-ons is a common social engineering practice.
Many Trojans attempt to lure victims by pretending to be ActiveX files for Internet Explorer. Attackers also commonly use the promise of pornographic or sensational videos to dupe users into downloading malware-laden fake codec files.