Security alert 26 fraudulent apps in the App Store seek to steal your seed phrase

Published 5 min de lectura 84 reading

A recent research report has uncovered a campaign that sought to empty cryptomoneda portfolios through fraudulent applications hosted in the Apple App Store. Security researchers have identified 26 malicious apps posing as known wallets - Metamask, Coinbase, Trust Wallet, OneKey and others - with the intention of capturing the recovery phrases (seed phrases) and allowing direct fund theft.

The engineering of deception combined simple but effective techniques: orthographic variations of the name of legitimate applications (typosquatting), logos and counterfeit catches and until the publication of these apps as games or calculators to hide their real goal. This "harmless" appearance had a strategic purpose: many of the crypto applications are restricted or directly blocked in certain markets, so presenting them as harmless software is a way of overcoming barriers and gaining user confidence.

Security alert 26 fraudulent apps in the App Store seek to steal your seed phrase
Image generated with IA.

According to Kaspersky's analysis, the 26 copies are part of a single campaign labeled FakeWallet, which researchers relate to a previous operation known as SparkKitty. When a victim opens the app, the flow redirects it to phishing pages that perfectly mimic the web covers of the crypt services. These pages not only ask for credentials: they induce the user to download broken versions of purse using iOS supply profiles, a legitimate Apple mechanism that, when abused, allows the sideloading of code not approved by the App Store.

The abuse of supply profiles is the critical link of the scam. Apple offers business and developer mechanisms that facilitate the direct installation of apps on devices; these same mechanisms can be used to avoid regular store review and distribute malicious software. Kaspersky documents how fraudulent pages install profiles that allow to run the threaded apps outside the normal flow of the App Store.

Once installed, these apps include code that intercepts the mnemonic phrases when the user creates or recovers a portfolio. The captured text is numbered and sent to the fraud operator. In the case of cold portfolios (hardware wallets) such as Ledger, the attackers used fraudulent verification screens within the app to persuade the user to manually enter his seed phrase under the excuse of a security check. That phrase, which should never be shared, allows the portfolio to be restored to another device and the assets to be transferred immediately.

We must understand it without technicalities: the seed phrase is the master key to a portfolio. Whoever knows it can recreate the portfolio and move the funds without the possibility of reversing the operation in most blockchains. This is why specialists repeat a simple and strong maximum: never enter your recovery phrase into an app or web, not even if it looks official.

Kaspersky's team warns that, although the campaign focused on users in China, the code and methods do not incorporate intrinsic geographical restrictions: if operators decide to extend their target, users from other regions could be affected. Apple removed the 26 applications of the App Store after the responsible notification of Kaspersky, but there are still questions about how these binaries managed to pass the store's initial controls and whether there were violations in the validation process.

The incident is not isolated. Last week, a false Ledger app was also reported to have arrived at the App Store and reportedly facilitated the theft of approximately $9.5 million in cryptomonedas from affected users' macOS computers. Specialized means such as BleepingComputer have tried to get more information from Apple on how the controls were avoided, without receiving an immediate response at the time of its publication.

What practical measures can users take to protect themselves? First of all, always check the source of the link you use to download a portfolio: access from the official supplier's page or from the links that that supplier publishes on its verified channels. If an app requests to install a supply profile or access advanced system options, it is necessary to suspect by default and close the process until it is legitimate.

In addition, it avoids introducing the seed phrase into applications or websites. The hardware portfolios are designed so that the phrase never comes out of the device; if any screen asks for the seed "for safety," it is a sign of fraud. Hardware wallet companies often explain the safe use of the phrase in their help resources, such as Ledger's guide to what is a seed phrase ( Ledger Academy).

Updating the operating system and applications, carefully reading the developer's identity on the App Store tab, and distrusting facilities that depend on business profiles are additional steps to minimize risks. If you have recently installed an app that requested a profile and doubts of its origin, uninstall it and remove any associated profile from the device settings. To better understand the technical framework that the attackers exploit, documentation on Apple's developer and company programs offers context on supply profiles ( Apple Developer Enterprise Program).

Security alert 26 fraudulent apps in the App Store seek to steal your seed phrase
Image generated with IA.

If you think your seed phrase has been compromised, the most prudent thing is to move the funds to a new portfolio whose backup has never been exposed anywhere and, if you use hardware walk, activate advanced protection functions such as passphrases or additional protected accounts. The incident should also be notified to the wallet provider and the fraud should be reported to the local authorities and platforms where you found the app.

In the background, these attacks recall a classic digital security lesson: the chains of trust are as strong as the weakest link. When a malicious app is able to simulate a legitimate service, the responsibility lies in part with the detection mechanisms and the user's caution, but also with the need for app stores and developers to strengthen controls and official distribution channels. Maintaining the guard and applying digital hygiene practices remains the best defense.

The Kaspersky report ( FakeWallet analysis in Securelist) and the coverage of related incidents in specialized media such as BleepingComputer.

Coverage

Related

More news on the same subject.