Flash.itsportsbetDocsFinance & Crypto
Related
Bitcoin at a Crossroads: Eric Trump and John Koudounis on the Asset's Evolution from Speculation to Strategic ReserveWhy Lululemon Needs Its Own Gap-Style RevivalFrom Bitcoin Price to MSTR Stock: A Guide to Decoding the Leveraged Proxy and STRC OpportunityExodus Acquires Payment Infrastructure to Build Self-Custody 'Super App' After NYSE OrdealEric Trump and Calamos CEO Declare Bitcoin a Global Reserve Asset, Predict $1 Million Price TargetSpirit Airlines on Brink of Shutdown After Trump Bailout Talks CollapseFrom Vibe to Code: A UX Designer's Guide to AI-Powered Prototyping7 Key Insights: Why Wind Farm Customers Crave 'Shape' and Investors Seek Certainty – With Storage as the Game Changer

FakeWallet Malware: How Phony iOS Apps Are Stealing Crypto Recovery Phrases

Last updated: 2026-05-04 12:55:36 · Finance & Crypto

Introduction: A Growing Threat in the iOS Ecosystem

In early 2026, cybersecurity researchers uncovered a sophisticated campaign targeting cryptocurrency users through the Apple App Store. Over twenty malicious applications were discovered masquerading as well-known crypto wallet apps. Once installed, these apps redirect users to deceptive browser pages that closely mimic the App Store interface, distributing trojanized versions of legitimate wallet software. The primary goal of this malware is to steal recovery phrases and private keys, granting attackers full control over victims' digital assets. Evidence from the malware's metadata suggests this operation has been active since at least the autumn of 2025, operating stealthily under the radar.

FakeWallet Malware: How Phony iOS Apps Are Stealing Crypto Recovery Phrases
Source: securelist.com

Historical Context and Evolution

This is not an entirely new phenomenon. In 2022, ESET researchers identified compromised crypto wallets distributed through phishing websites. Those attacks exploited iOS provisioning profiles to install malware, successfully stealing recovery phrases from major hot wallets such as MetaMask, Coinbase, Trust Wallet, TokenPocket, Bitpie, imToken, and OneKey. Now, four years later, the same criminal strategy is resurgent with enhanced capabilities. The latest variant includes new malicious modules, improved injection techniques, and a more sophisticated distribution method—using fake apps hosted directly on the App Store.

Technical Details of the FakeWallet Campaign

Discovery and Initial Findings

In March 2026, security analysts observed a wave of phishing apps dominating search results in the Chinese App Store. These apps were disguised as popular cryptocurrency wallets. Due to regional restrictions, users with Apple IDs set to the Chinese region cannot access many official crypto wallet apps directly. Cybercriminals are exploiting this gap by creating fake apps that use icons identical to the originals and names with intentional typos—a technique known as typosquatting—to bypass App Store filters and deceive unsuspecting users.

Deceptive Design and Functionality

Some of these phishing apps featured names and icons completely unrelated to cryptocurrency. However, their promotional banners falsely claimed that the official wallet was "unavailable in the App Store" and directed users to download it through the app instead. This bait-and-switch tactic lures victims into a false sense of security.

During the investigation, researchers identified 26 phishing apps imitating the following major wallets:

FakeWallet Malware: How Phony iOS Apps Are Stealing Crypto Recovery Phrases
Source: securelist.com
  • MetaMask
  • Ledger
  • Trust Wallet
  • Coinbase
  • TokenPocket
  • imToken
  • Bitpie

All findings were promptly reported to Apple, and several of the malicious apps have already been removed from the store. Additionally, a number of similar apps were discovered that did not yet exhibit phishing functionality but showed strong links to the same threat actors. It is highly probable that their malicious features are merely deactivated and could be enabled in a future update.

The Role of Stub Applications

To further mask their true purpose, the phishing apps incorporated stubs—functional placeholders that mimic a legitimate service. These stubs could take the form of a simple game, a calculator, or a task planner. This design makes the app appear authentic upon first launch, reducing suspicion and increasing the likelihood that users will continue engaging with it long enough for the malware to execute its payload.

Detection and Protection

Kaspersky products detect this threat under the names HEUR:Trojan-PSW.IphoneOS.FakeWallet.* and HEUR:Trojan.IphoneOS.FakeWallet.*. Users are advised to only download crypto wallet apps from official developer websites or verified sources, and to carefully check app names for typos or unusual icons. Enabling two-factor authentication and using hardware wallets for large holdings can provide additional layers of security against such phishing attempts.

Conclusion

The resurgence of the FakeWallet campaign demonstrates that cybercriminals are continuously refining their methods to exploit the trust users place in official app stores. As the crypto ecosystem grows, so does the ingenuity of attackers. Staying informed and vigilant is the best defense against these evolving threats.