# 26 Malicious Cryptocurrency Wallet Apps Discovered on Apple App Store in Ongoing Phishing Campaign
Cybersecurity researchers at Kaspersky have uncovered a sophisticated supply chain attack targeting cryptocurrency users through the Apple App Store, with at least 26 fraudulent applications impersonating legitimate wallet platforms. The campaign, which has been active since at least fall 2025, uses a multi-stage deception technique to trick users into compromising their cryptocurrency assets by stealing recovery phrases and private keys.
## The Threat
The discovered malicious applications operate under names designed to closely resemble trusted cryptocurrency wallet providers, leveraging brand confusion to gain user trust. Once installed and launched, these apps execute a deceptive redirect mechanism that transports users to counterfeit App Store pages with visual elements mimicking Apple's official storefront design.
The attack sequence works as follows:
1. User downloads what appears to be a legitimate wallet app from the App Store
2. Upon opening, the app redirects to a fake webpage designed to resemble the official App Store interface
3. The fraudulent page directs users to download "updated" or "trojanized" versions of popular wallet applications
4. These counterfeit wallets prompt users to enter or restore their cryptocurrency wallet recovery phrases
5. Attackers collect the recovery phrases, granting them full access to victims' cryptocurrency holdings
The sophistication of this campaign lies not in technical complexity but in social engineering. By leveraging Apple's trusted platform and creating visually convincing replicas of the App Store interface, threat actors exploit user assumptions about platform security and brand authenticity.
## Background and Context
Cryptocurrency wallet applications represent an increasingly attractive target for cybercriminals due to the irreversible nature of blockchain transactions and the substantial financial assets users typically entrust to these platforms. Unlike traditional financial accounts where unauthorized transfers can be reversed, cryptocurrency theft is generally permanent.
Recent trends in cryptocurrency app security:
The Apple App Store, historically promoted as a secure distribution channel with strict review processes, has previously fallen victim to similar campaigns. This discovery highlights the ongoing challenge of maintaining security at scale while accommodating millions of applications and legitimate user choice.
## Technical Details
The attack demonstrates careful attention to convincing users through visual and behavioral mimicry rather than exploiting technical vulnerabilities in iOS itself. This social engineering-focused approach is often more effective than zero-day exploits because it operates within user expectations rather than against them.
Key technical components of the attack:
| Attack Stage | Method | Mechanism |
|---|---|---|
| App Distribution | Deceptive branding | Apps named similarly to legitimate wallets (e.g., "Wallet Pro," "MetaMask+" with visual variations) |
| Initial Launch | Automatic redirect | Upon opening, apps execute JavaScript or deep linking to external domains |
| Visual Spoofing | HTML/CSS replication | Fraudulent web pages replicate App Store design elements, including pricing pages and download buttons |
| Credential Harvesting | Fake recovery interface | Compromised pages display wallet import screens requesting 12-24 word seed phrases |
| Persistence | Trojanized APK/IPA | Downloaded files contain modified wallet code that transmits credentials to attacker servers |
The trojanized wallet applications discovered in this campaign contain modified code that intercepts and exfiltrates recovery phrases before allowing legitimate wallet functionality to resume. This allows some users to complete transactions normally, potentially avoiding immediate detection of compromise.
## Implications for Users and Organizations
The discovery of this campaign raises several critical concerns for the cryptocurrency ecosystem and the broader mobile application security landscape.
Immediate risks:
Broader ecosystem implications:
The campaign highlights fundamental challenges in app store security models. Even with human review processes, the scale of app distribution makes comprehensive vetting impractical. Additionally, the visual similarity attack vector—where malicious apps use confusingly similar names and interfaces—represents a class of threat that technical security controls alone cannot address.
For cryptocurrency platforms and wallet providers, this incident underscores the risk of relying on centralized app stores as the primary distribution mechanism. Hardware wallet manufacturers and non-custodial platforms must consider how their ecosystem guides users safely between devices and applications.
## User Protection Recommendations
For cryptocurrency users:
For platform administrators:
## Conclusion
The discovery of 26 malicious wallet applications represents a mature social engineering attack that prioritizes convincing user deception over technical exploitation. The campaign's success highlights critical limitations in centralized app store security models and the ongoing vulnerability of users who rely primarily on visual cues to verify application authenticity.
For cryptocurrency users, the most effective protection remains skepticism toward unexpected interface changes, verification of download sources through multiple channels, and consideration of security architectures—such as hardware wallets—that reduce exposure to mobile-based compromise. For platform providers and security teams, the incident reinforces the necessity of post-deployment monitoring and rapid response capabilities to emerging threats, even on platforms with established review processes.
As cryptocurrency adoption continues to expand among mainstream users with varying technical expertise, similar campaigns should be expected. The security of distributed asset systems ultimately depends on user education and architectural choices that reduce opportunities for social engineering attacks.