Crypto Thieves Breach Apple’s China App Store with Sneaky Wallet Imposters
A sophisticated app scam drained crypto wallets by mimicking trusted brands and exploiting Apple’s own security features.
When trusted digital storefronts like Apple’s App Store become hunting grounds for cybercriminals, even the most cautious users can fall prey. In a recent campaign targeting Chinese users, a shadowy group managed to slip 26 malicious apps past Apple’s defenses, masquerading as popular cryptocurrency wallets. The result: stolen fortunes and a sobering reminder that not all that glitters in the App Store is gold.
The “FakeWallet” operation, linked to the SparkKitty campaign, used a blend of deception and technical trickery to target crypto enthusiasts in China. Official crypto wallet apps are tightly restricted in the country, so attackers exploited a loophole: they disguised their malware as games or calculators, hoping users would see them as clever workarounds to the ban.
But the real trap was in the technical sleight of hand. Once installed, these counterfeit apps redirected users to phishing sites that closely mimicked legitimate crypto services. Here, users were prompted to download altered wallet apps via Apple’s legitimate iOS provisioning profiles - a feature intended for enterprise software distribution, but abused in this case to sideload malware onto unsuspecting devices.
The malicious apps included code designed to intercept and secretly transmit the seed phrases - unique codes required to restore crypto wallets - to the attackers. For cold wallets like Ledger, the apps deployed convincing in-app phishing screens, tricking users into entering their recovery phrases during fake security checks. Once in possession of these phrases, the criminals could restore the wallets on their own devices and drain them, leaving victims powerless to recover their funds.
While the campaign’s primary focus was China, security experts warn that the malware is technically capable of targeting users worldwide. The breach also raises questions about Apple’s app review process, as this isn’t the first time crypto-related malware has slipped through: just last week, a fake Ledger app stole $9.5 million from Mac users.
Apple has since removed the offending apps, but the incident highlights a dangerous intersection of regulatory loopholes, technical abuse, and the growing sophistication of cybercriminals. For cryptocurrency holders, it’s a wake-up call to double-check app publishers, stick to official download links, and remember: even the most trusted platforms can be compromised.
As digital assets become increasingly mainstream, so too do the threats lurking behind seemingly harmless icons. In the world of crypto, vigilance is more than just a virtue - it may be the last line of defense between fortune and fraud.
WIKICROOK
- Typosquatting: Typosquatting is when attackers use lookalike names of trusted sites or software to trick users into visiting fake sites or downloading malware.
- Seed Phrase: A seed phrase is a set of words that acts as the master key to a crypto wallet. Anyone with it can access and control your funds.
- iOS Provisioning Profile: An iOS provisioning profile is a file that authorizes app installation on specific Apple devices outside the App Store, mainly for enterprise or testing purposes.
- Sideloading: Sideloading is installing apps or software from outside official app stores, often skipping standard security checks and increasing potential risks.
- Cold Wallet: A cold wallet securely stores cryptocurrency offline, protecting it from online hacks and unauthorized access by keeping private keys disconnected from the internet.