Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
    Cybersecurity

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    adminBy adminApril 25, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025.

    “Once launched, these apps redirect users to browser pages designed to look similar to the App Store and distribute trojanized versions of legitimate wallets,” Kaspersky researcher Sergey Puzan said. “The infected apps are specifically engineered to hijack recovery phrases and private keys.”

    The 26 apps, collectively dubbed FakeWallet, mimic various popular wallets like Bitpie, Coinbase, imToken, Ledger, MetaMask, TokenPocket, and Trust Wallet. Many of these apps have since been taken down by Apple following disclosure. There is no evidence that these apps were distributed via the Google Play Store.

    While malicious cryptocurrency wallets distributed in the past via bogus websites have abused iOS provisioning profiles to get users to install them, the latest crypto-theft scheme is an improvement in several ways. For starters, the apps are directly available for download from Apple’s App Store if a user has their Apple account set to China.

    These apps have icons that mirror the original but have intentional typos in their names (e.g., LeddgerNew) so as to trick unsuspecting users into downloading them. In some cases, the app names and icons have no connection to cryptocurrency. Instead, they are used as placeholders to direct users to download the official wallet app through them, claiming they are “unavailable in the App Store” due to regulatory reasons.

    Kaspersky said it also identified several similar apps likely linked to the same threat actor that do not have the malicious features enabled, but have been found to mimic a benign service, such as a game, a calculator, or a task planner. Once launched, these apps open a link on the web browser and leverage enterprise provisioning profiles to install the wallet app on the victim’s device.

    “The attackers have churned out a wide variety of malicious modules, each tailored to a specific wallet,” Puzan said. “In most cases, the malware is delivered via a malicious library injection, though we’ve also come across builds where the app’s original source code was modified.”

    The end goal of these infections is to look for mnemonic phrases from both hot and cold wallets, and exfiltrate them to an external server, allowing the operators to seize control of victims’ wallets and drain cryptocurrency assets or initiate fraudulent transactions.

    The seed phrases are captured either by hooking the code that’s responsible for the screen where the user enters their recovery phrase or serving a phishing page that instructs the victim to enter their mnemonics as part of a supposed verification step.

    It’s suspected the campaign could be the work of threat actors linked to the SparkKitty trojan campaign last year, given that some of the infected apps also come with a module to steal wallet recovery phrases using optical character recognition (OCR), and that both the campaigns appear to be the work of native Chinese speakers and specifically target cryptocurrency assets.

    “The FakeWallet campaign is gaining momentum by employing new tactics, ranging from delivering payloads via phishing apps published in the App Store to embedding themselves into cold wallet apps and using sophisticated phishing notifications to trick users into revealing their mnemonics,” Kaspersky said.

    MiningDropper Android Malware Framework Emerges

    The discovery comes as Cyble sheds light on a sophisticated Android malware delivery framework known as MiningDropper (aka BeatBanker) that combines cryptocurrency mining with information theft, remote access, and banking malware in attacks targeting users in India, as well as in Latin America, Europe, and Asia as part of a BTMOB RAT campaign.

    MiningDropper has been distributed via a trojanized version of the open-source Android application project Lumolight, with the campaigns using fake websites impersonating banking institutions and regional transport offices to propagate the malware. Once launched, it activates a multi-stage sequence to extract the miner and the trojan payloads from an encrypted assets archive present within the package.

    “MiningDropper employs a multi-stage payload delivery architecture that combines XOR-based native obfuscation, AES-encrypted payload staging, dynamic DEX loading, and anti-emulation techniques,” Cyble said. “MiningDropper employs a multi-stage payload delivery architecture that combines XOR-based native obfuscation, AES-encrypted payload staging, dynamic DEX loading, and anti-emulation techniques.”

    “MiningDropper demonstrates a layered, modular Android malware architecture designed to make static analysis difficult while giving threat actors flexibility in final payload delivery. This design allows the threat actor to reuse the same distribution and installation framework across hundreds of samples while adapting the final monetization objective to operational needs.”

    app Apple apps Crypto FakeWallet Phrases seed Store targeting
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy Google Has Changed & Who’s Really Paying for It
    Next Article This duster changed the way I clean my gear, and now you can grab one for cheap
    admin
    • Website

    Related Posts

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    Indirect prompt injection is taking hold in the wild

    April 25, 2026

    ADT confirms data breach after ShinyHunters leak threat

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    8 SEO tasks you shouldn’t do manually

    April 25, 2026

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    This duster changed the way I clean my gear, and now you can grab one for cheap

    April 25, 2026

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,501)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (922)
    • Tech Tools & Mobile / Apps (1,786)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    8 SEO tasks you shouldn’t do manually

    April 25, 2026

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    This duster changed the way I clean my gear, and now you can grab one for cheap

    April 25, 2026
    Most Popular
    • 8 SEO tasks you shouldn’t do manually
    • North Korea’s Lazarus Targets macOS Users via ClickFix
    • This duster changed the way I clean my gear, and now you can grab one for cheap
    • 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
    • Why Google Has Changed & Who’s Really Paying for It
    • The Galaxy Z Fold 8 Wide might use a familiar aspect ratio
    • Indirect prompt injection is taking hold in the wild
    • 10 Hacks Every YouTube Music User Should Know
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.