Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 23, 2026

    Protected: Canadian Security Intelligence Service Lifecycle of Warranted Information: Report – HTML

    April 23, 2026

    ZDI-26-259: (0Day) Docker Desktop cli-plugins Incorrect Permission Assignment Local Privilege Escalation Vulnerability

    April 23, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»China’s Apple App Store infiltrated by crypto-stealing wallet apps
    News

    China’s Apple App Store infiltrated by crypto-stealing wallet apps

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    China's Apple App Store infiltrated by crypto-stealing wallet apps

    A set of 26 malicious apps on Apple App Store impersonate popular wallets, such as Metamask, Coinbase, Trust Wallet, and OneKey, to steal recovery or seed phrases and drain them of cryptocurrency assets.

    The threat actor used multiple methods to imitate official products, including typosquatting and fake branding, to lure users in China into downloading them.

    Because such apps are restricted in the country, the attacker published them as games or calculator apps, likely in the hope of being perceived by the users as a trick to bypass the bans in the country.

    image

    Kaspersky researchers say that all 26 fake apps are part of the same campaign, which they named FakeWallet, and associate them with the SparkKitty operation that has been running since last year.

    Once opened, the apps redirect users to phishing pages designed to appear as legitimate portals for the crypto services.

    Fake website impersonating Ledger
    Fake website impersonating Ledger
    Source: Kaspersky

    These sites convince victims to download trojanized wallet apps using iOS provisioning profiles, a legitimate enterprise feature that is abused to sideload malware onto their devices. The same technique was also observed in SparkKitty.

    Installed provisioning profile
    Installing a provisioning profile
    Source: Kaspersky

    The trojanized apps contain additional code that intercepts mnemonic phrases during wallet setup or recovery screens, encrypts them with RSA and Base64, and sends them to the attacker.

    For cold wallets like Ledger, attackers rely on in-app phishing prompts that trick users into manually entering their seed phrases via fake security verification screens.

    These phrases, which are only held by the rightful wallet owner, are intended for wallet porting/recovery to new devices and require no further confirmation or passwords.

    Hence, threat actors can use them to restore the victim’s wallet on their own devices and drain the wallet without the possibility of recovering the funds.

    Seed phrase phising screen
    Seed phrase phising screen
    Source: Kaspersky

    Kaspersky noted that the campaign primarily targets users in China. However, the malware itself has no geographic restrictions, so it could affect users globally if the operators decide to expand their targeting scope.

    Cryptocurrency holders are advised to double-check the publisher of the apps they download, even from official app stores, and use only the links provided on the official website.

    Last week, it was uncovered that a fraudulent Ledger app that made it into Apple’s App Store stole $9.5 million worth of cryptocurrency from 50 macOS users.

    Apple has removed all 26 FakeWallet apps from the App Store following Kaspersky’s responsible disclosure.

    BleepingComputer has contacted Apple with questions about the threat actor’s process to bypass the company’s App Store verfications but we have not received a response by publication time.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-280: (Pwn2Own) HP DeskJet 2855e JobStatusEvent Stack-based Buffer Overflow Remote Code Execution Vulnerability
    Next Article ZDI-26-268: Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability
    admin
    • Website

    Related Posts

    News

    Protected: Canadian Security Intelligence Service Lifecycle of Warranted Information: Report – HTML

    April 23, 2026
    News

    Startups Brag They Spend More Money on AI Than Human Employees

    April 22, 2026
    News

    Apple fixes iOS bug that retained deleted notification data

    April 22, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202632 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202632 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 23, 2026

    Protected: Canadian Security Intelligence Service Lifecycle of Warranted Information: Report – HTML

    April 23, 2026

    ZDI-26-259: (0Day) Docker Desktop cli-plugins Incorrect Permission Assignment Local Privilege Escalation Vulnerability

    April 23, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.