Crypto & Blockchain

Fake Crypto Wallets Drain Funds on Apple App Store

Apple's App Store, long touted as a secure haven, has become a hunting ground for digital thieves. A new report details how 26 fake cryptocurrency wallet apps managed to slip past Cupertino's defenses, lining criminals' pockets with unsuspecting users' funds.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
A close-up of an iPhone screen displaying the Apple App Store with several cryptocurrency wallet icons, some of which are highlighted as potentially fake.

Key Takeaways

  • 26 fake cryptocurrency wallet apps were found on the Apple App Store, impersonating popular legitimate wallets.
  • These apps used phishing tactics and enterprise developer profiles to trick users into installing malware that stole seed phrases and drained digital assets.
  • Kaspersky reported the findings to Apple, which subsequently removed the fraudulent applications, but the campaign highlights ongoing security risks.

You boot up your iPhone, ready to check your crypto portfolio. Everything looks normal. Then, poof. Your digital assets? Gone. This isn’t a sci-fi plot; it’s the grim reality that unfolded for users who fell for a sophisticated scam on Apple’s very own App Store. Cybersecurity outfit Kaspersky just dropped a bombshell, revealing a campaign that unleashed 26 fake cryptocurrency wallet applications, all masquerading as legitimate tools on the supposedly secure platform. And yes, they were good enough to fool people. Really good.

The operation, quietly tracked since late last year, appears to have some ties to the folks behind the SparkKitty malware family. These aren’t amateur hour crooks. They meticulously cloned popular digital asset managers like MetaMask, Ledger, Trust Wallet, and others, right down to the icons and naming conventions. For Chinese iOS users, where many of these legitimate wallets aren’t even available in the local store, this was a particularly insidious trap, though the danger was global.

At first glance, these fake apps were innocent enough. They’d often come bundled with basic utilities – a calculator, a to-do list, maybe a little game. Just enough to look like a legit utility app, not some shady piece of software. The real trouble started after you launched it. Instead of showing you your crypto, you’d be whisked away to a phishing site that looked exactly like the Apple App Store. Here’s where it got clever. These fake pages would then tell you that you needed to install an ‘official update’ by adding an enterprise developer profile to your device. This little trick, a known SparkKitty tactic, bypasses normal iOS security measures and delivers the real malware.

And the malware? It was surgical. For your ‘hot’ wallets—the ones where your private keys are sitting on your phone—it quietly snagged your seed phrases when you entered them during setup or recovery. For ‘cold’ wallets, the ones supposedly more secure because they use offline hardware, the fake apps would outright ask for your recovery phrases. Listen, no legitimate wallet software ever asks for your seed phrase over the internet. That’s the golden rule. Once they had those phrases, your funds were as good as gone. Irreversible access. Total drainage. It’s almost elegantly brutal.

Naturally, Kaspersky flagged this to Apple, and all 26 apps have since been yanked. But the damage is done, and the message is clear: even the App Store isn’t immune to this kind of sophisticated social engineering. Sergey Puzan, a mobile malware expert, pointed out something rather telling: criminals are willing to pay for developer accounts just to target iOS users. That tells you the perceived value and the risk appetite in this space. Mobile crypto management, it seems, carries persistent risks.

Users should treat every unexpected prompt or link with suspicion.

Solid advice, though I’d add: especially when it comes to anything related to your crypto. Kaspersky’s recommendations are pretty standard, but essential. Don’t follow in-app redirects unless you absolutely trust the source, and never install enterprise developer profiles unless your actual employer tells you to. Your recovery phrases are the keys to your kingdom; only ever enter them on official hardware devices directly from the manufacturer. And for the love of all things digital, always, always verify the publisher name against the official website of your wallet. That little bit of extra due diligence could save you a world of financial heartache.

This whole episode is just another reminder that as crypto goes more mainstream, the bad actors are getting more creative. They’re not just building fake exchanges anymore; they’re infiltrating the very platforms we trust to get to our digital wealth. Vigilance, as Kaspersky rightly notes, is still the most effective shield. But frankly, when these scams look this polished and slip through Apple’s filters, how much vigilance is enough? Who’s actually making money here? It’s not the users losing their life savings, that’s for sure. It’s the scammers, and potentially the criminals paying for those dodgy developer accounts.

Is This a New Kind of Attack?

Not entirely. The core mechanics – impersonation, phishing, and using enterprise profiles for sideloading – have been seen before, particularly with the SparkKitty family. What’s significant is the sheer scale of the operation (26 apps) and its successful infiltration of Apple’s official App Store, a platform usually seen as more secure than its Android counterpart. It demonstrates a refinement of existing tactics to exploit user trust in official marketplaces.

How Did These Apps Stay on the Store for So Long?

It’s a question many have asked about app store security. The attackers likely employed a strategy of creating apps that appeared benign initially, only activating their malicious functions after a period or under specific conditions. This could have helped them evade automated detection systems and even initial manual reviews. The reliance on enterprise profiles for the actual payload delivery also adds a layer of complexity that might have initially bypassed standard app vetting processes.

What Does This Mean for Apple’s App Store Security?

It’s a black eye, plain and simple. Apple’s App Store has long been positioned as a premium, secure ecosystem. Incidents like this chip away at that perception. While Apple did remove the apps once alerted, the fact that they were available for download in the first place raises questions about the effectiveness and depth of their review processes for certain types of applications, especially those that might offer less obvious immediate harm. It suggests a constant cat-and-mouse game where attackers find new ways to exploit the system.

The Bottom Line

This isn’t about a new technology; it’s about old tricks executed with professional polish on a platform many assumed was impenetrable. For crypto users, it’s a stark reminder that trust in a logo isn’t enough. You’ve got to do your homework, verify, and never, ever give up your seed phrase unless you’re absolutely certain where it’s going. Your digital fortune depends on it.

“Users should treat every unexpected prompt or link with suspicion.” - Sergey Puzan, Mobile Malware Expert

Key Takeaways

  • 26 Fake Apps: Researchers discovered 26 counterfeit crypto wallet applications on Apple’s App Store.
  • Phishing and Sideloading: The apps redirected users to phishing sites and used enterprise developer profiles to install malicious trojans.
  • Seed Phrase Theft: The malware was designed to steal private keys and seed phrases from both hot and cold crypto wallets.
  • Apple Notified: Kaspersky reported the issue, leading to Apple removing all the fraudulent apps.
  • Persistent Risk: The incident highlights ongoing risks in mobile cryptocurrency management and the need for user vigilance.

🧬 Related Insights

Priya Patel
Written by

Crypto markets reporter covering Bitcoin, Ethereum, altcoins, and on-chain market dynamics.

Worth sharing?

Get the best Fintech stories of the week in your inbox — no noise, no spam.

Originally reported by Crowdfund Insider

Stay in the loop

The week's most important stories from Fintech Dose, delivered once a week.