Fake Wallet Apps Infiltrate Apple App Store, Targeting Crypto Seed Phrases

Fake Wallet Apps Infiltrate Apple App Store, Targeting Crypto Seed Phrases
A wave of deceptive applications masquerading as legitimate cryptocurrency wallets has been discovered on the Apple App Store, with the primary objective of pilfering users' sensitive recovery phrases and private keys. These malicious applications have been active since at least the latter half of 2025, posing a significant threat to digital asset holders.
Published: 2026-04-24 | Author: Patrick Mattos
Security researchers have identified a coordinated campaign involving 26 fake wallet applications that successfully bypassed Apple's App Store review process. These applications, collectively referred to as FakeWallet, were designed to mimic popular cryptocurrency services such as Bitpie, Coinbase, imToken, Ledger, MetaMask, TokenPocket, and Trust Wallet. While many have since been removed by Apple, their presence highlights a persistent challenge in securing mobile application marketplaces. The campaign appears to have specifically targeted users with Apple accounts configured for China.
The deceptive tactics employed by these apps range from subtle misspellings in their names (e.g., "LeddgerNew") to more elaborate schemes where the app icon and name bear no resemblance to cryptocurrency wallets. In such cases, the fake app serves as a lure, redirecting users to download official wallet applications through a purported "unavailable in the App Store" notification, often citing regulatory reasons. This sophisticated social engineering aims to build trust before the actual theft mechanism is initiated.
Technical Context
The FakeWallet campaign exhibits a multi-faceted approach to compromise user credentials. Once launched, these applications often redirect users to spoofed browser pages that closely resemble the official App Store. From these pages, users are prompted to download trojanized versions of legitimate wallet applications. A key technique observed involves malicious library injection into the application's code, or in some instances, direct modification of the original source code.
The ultimate goal is to intercept mnemonic phrases, commonly known as seed phrases, which are critical for recovering cryptocurrency wallets. Attackers achieve this by either hooking into the application's code responsible for capturing recovery phrase input or by presenting a phishing page that demands users enter their mnemonics under the guise of a verification process. Researchers also noted the presence of modules capable of stealing wallet recovery phrases using Optical Character Recognition (OCR), a technique potentially linked to previous threat actor activity. Some of these apps, disguised as benign utilities like games or calculators, leverage enterprise provisioning profiles to install the wallet app on a victim's device.
Impact and Risk
The primary risk associated with the FakeWallet campaign is the direct theft of cryptocurrency assets. By obtaining a user's seed phrase or private keys, attackers gain complete control over their digital wallets. This allows them to drain funds, initiate fraudulent transactions, and potentially compromise any associated accounts. The severity of this threat is exceptionally high for cryptocurrency holders, as the loss of these credentials is often irreversible. The campaign's success in appearing on the Apple App Store, even if briefly, indicates a significant risk to a broad user base, particularly those who may not be highly technically savvy or vigilant about application authenticity.
Defensive Takeaways
Users should exercise extreme caution when downloading cryptocurrency wallet applications. Always verify the developer's name and ensure the app is from the official source. Be wary of applications with slight misspellings or unusual names. Regularly review your installed applications and uninstall any that seem suspicious or are no longer needed. For enhanced security, consider using hardware wallets for storing significant amounts of cryptocurrency and avoid entering seed phrases on any device that has had unknown applications installed. Implementing multi-factor authentication on any associated exchange accounts can provide an additional layer of defense.
