Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»China’s Apple App Store infiltrated by crypto-stealing wallet apps
    Cybersecurity

    China’s Apple App Store infiltrated by crypto-stealing wallet apps

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    China
    Share
    Facebook Twitter LinkedIn Pinterest Email

    China's Apple App Store infiltrated by crypto-stealing wallet apps

    A set of 26 malicious apps on Apple App Store impersonate popular wallets, such as Metamask, Coinbase, Trust Wallet, and OneKey, to steal recovery or seed phrases and drain them of cryptocurrency assets.

    The threat actor used multiple methods to imitate official products, including typosquatting and fake branding, to lure users in China into downloading them.

    Because such apps are restricted in the country, the attacker published them as games or calculator apps, likely in the hope of being perceived by the users as a trick to bypass the bans in the country.

    image

    Kaspersky researchers say that all 26 fake apps are part of the same campaign, which they named FakeWallet, and associate them with the SparkKitty operation that has been running since last year.

    Once opened, the apps redirect users to phishing pages designed to appear as legitimate portals for the crypto services.

    Fake website impersonating Ledger
    Fake website impersonating Ledger
    Source: Kaspersky

    These sites convince victims to download trojanized wallet apps using iOS provisioning profiles, a legitimate enterprise feature that is abused to sideload malware onto their devices. The same technique was also observed in SparkKitty.

    Installed provisioning profile
    Installing a provisioning profile
    Source: Kaspersky

    The trojanized apps contain additional code that intercepts mnemonic phrases during wallet setup or recovery screens, encrypts them with RSA and Base64, and sends them to the attacker.

    For cold wallets like Ledger, attackers rely on in-app phishing prompts that trick users into manually entering their seed phrases via fake security verification screens.

    These phrases, which are only held by the rightful wallet owner, are intended for wallet porting/recovery to new devices and require no further confirmation or passwords.

    Hence, threat actors can use them to restore the victim’s wallet on their own devices and drain the wallet without the possibility of recovering the funds.

    Seed phrase phising screen
    Seed phrase phising screen
    Source: Kaspersky

    Kaspersky noted that the campaign primarily targets users in China. However, the malware itself has no geographic restrictions, so it could affect users globally if the operators decide to expand their targeting scope.

    Cryptocurrency holders are advised to double-check the publisher of the apps they download, even from official app stores, and use only the links provided on the official website.

    Last week, it was uncovered that a fraudulent Ledger app that made it into Apple’s App Store stole $9.5 million worth of cryptocurrency from 50 macOS users.

    Apple has removed all 26 FakeWallet apps from the App Store following Kaspersky’s responsible disclosure.

    BleepingComputer has contacted Apple with questions about the threat actor’s process to bypass the company’s App Store verfications but we have not received a response by publication time.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    app Apple apps Chinas cryptostealing infiltrated Store Wallet
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to win beyond clicks in AI search
    Next Article Researchers build an encrypted routing layer for private AI inference
    admin
    • Website

    Related Posts

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Researchers build an encrypted routing layer for private AI inference

    April 21, 2026

    Bluesky Disrupted by Sophisticated DDoS Attack

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Why you should buy a 2025 Razr now

    April 21, 2026

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Authority, Freshness & First-Party Signals

    April 21, 2026

    The ‘Gun God’ Controller Turns One Plus’ New Smartphone Into a Sleek Handheld Gaming Console

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,424)
    • Privacy & Online Earning (175)
    • SEO & Digital Marketing (864)
    • Tech Tools & Mobile / Apps (1,711)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Why you should buy a 2025 Razr now

    April 21, 2026

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Authority, Freshness & First-Party Signals

    April 21, 2026
    Most Popular
    • Why you should buy a 2025 Razr now
    • CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
    • Authority, Freshness & First-Party Signals
    • The ‘Gun God’ Controller Turns One Plus’ New Smartphone Into a Sleek Handheld Gaming Console
    • Researchers build an encrypted routing layer for private AI inference
    • China’s Apple App Store infiltrated by crypto-stealing wallet apps
    • How to win beyond clicks in AI search
    • This headphone feature fixes the most annoying Bluetooth problem I had
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.