The Dark Side of Crypto: Malicious Apps on Apple App Store Steal Recovery Phrases and Private Keys

Why This Caught My Attention

The Dark Side of Crypto: Malicious Apps on Apple App Store Steal Recovery Phrases and Private Keys

What Happened

The Dark Side of Crypto: Malicious Apps on Apple App Store Steal Recovery Phrases and Private Keys

Hey there, fellow cybersecurity enthusiast! I just came across this latest report that has me worried about the security of cryptocurrency users. It seems like a set of malicious apps has been discovered on the Apple App Store, designed to impersonate popular cryptocurrency wallets. These fake apps are trying to steal recovery phrases and private keys since at least fall 2025.

What’s the Scam?

The way it works is that these malicious apps redirect users to browser pages that look similar to the App Store. Once launched, they distribute trojanized versions of legitimate wallets. The infected apps are specifically engineered to hijack recovery phrases and private keys. It’s like a phishing scheme on steroids!

How Do They Work?

These fake apps have icons that mirror the original but with intentional typos in their names (e.g., LeddgerNew). This is done to trick unsuspecting users into downloading them. Some of these apps don’t even relate to cryptocurrency; they’re just used as placeholders to direct users to download the official wallet app through them, claiming it’s “unavailable in the App Store” due to regulatory reasons.

The Real Concern

What’s concerning is that some of these apps don’t have malicious features enabled initially. They seem to mimic a benign service like a game, calculator, or task planner. Once launched, they open a link on the web browser and leverage enterprise provisioning profiles to install the wallet app on the victim’s device.

The End Goal

The end goal of these infections is to capture mnemonic phrases from both hot and cold wallets and exfiltrate them to an external server, allowing the operators to seize control of victims’ wallets and drain cryptocurrency assets or initiate fraudulent transactions. It’s a game of cat and mouse!

FakeWallet Campaign

Kaspersky researchers suspect that this campaign could be linked to the SparkKitty trojan campaign last year. Some of the infected apps also come with a module to steal wallet recovery phrases using optical character recognition (OCR). Both campaigns appear to be the work of native Chinese speakers and specifically target cryptocurrency assets.

Conclusion

The discovery of these malicious apps on Apple App Store is a wake-up call for all cryptocurrency users. It’s essential to stay vigilant and ensure that your digital wallet is secure. Always research an app before installing it, and never enter sensitive information on unverified pages. Remember, prevention is the best medicine!

Real-World Tip

To avoid falling prey to these malicious apps:

1. Only download apps from trusted sources.
2. Research the app before installation.
3. Check for typos or intentional misspellings in the app name.
4. Be cautious of apps that claim to be unavailable on the App Store due to regulatory reasons.

Stay safe out there, and let’s keep those hackers at bay!

Why It Matters

Security concerns about cryptocurrency users. It seems like a set of malicious apps has been discovered on the Apple App Store, designed to impersonate popular cryptocurrency wallets. These fake apps are trying to steal recovery phrases and private keys since at least fall 2025.

My Take

Ensure that your digital wallet is secure. Always research an app before installing it, and never enter sensitive information on unverified pages.

Cyber Wave Digest: Charl Smith is a devoted lifelong fan of technology and games, possessing over ten years of expertise in reporting on these subjects. He has contributed to publications such as Game Developer, Black Hat, and PC World magazine.