Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Crypto Apps Target iOS Users on App Store

Malicious Crypto Apps Target iOS Users on App Store

Posted on April 21, 2026 By CWS

More than twenty fraudulent cryptocurrency applications have been identified on Apple’s App Store, targeting iOS users globally, according to a report by cybersecurity firm Kaspersky.

This malicious operation, known as FakeWallet, has been in progress since at least the fall of 2025. Its primary objective is to steal users’ recovery phrases and private keys, essential components for accessing digital wallets.

The fake apps came to notice in March after they frequently appeared in search results within the Chinese App Store environment.

Deceptive Tactics and Impact

Due to restrictions in China that limit access to many legitimate wallet applications, cybercriminals have resorted to mimicking popular app names and icons. This technique, known as typosquatting, tricks users into downloading what they believe to be authentic software.

Some of these applications do not carry recognizable cryptocurrency names or icons but use enticing banners to lure users into downloading them, promising access to official wallets otherwise unavailable on the App Store.

Kaspersky identified 26 phishing applications that imitate renowned wallets such as Bitpie, Coinbase, imToken, Ledger, MetaMask, TokenPocket, and Trust Wallet.

Technical Analysis and Findings

Further investigation revealed that some applications, although not initially phishing-enabled, were potentially linked to the same threat actor and could activate malicious features in future updates.

The phishing apps were designed to open browser links that prompt users to install infected versions of crypto wallets. These harmful codes were delivered through libraries or directly embedded within the wallet’s source code.

Code analysis showed functions to capture users’ recovery and seed phrases and intercept procedures when users attempted to restore their hot wallets. Cold wallets were also targeted through two Ledger implants.

Broader Implications and Response

Kaspersky also discovered a website impersonating the official Ledger site, hosting links to these fraudulent applications. Additionally, compromised wallet apps for Android were distributed through Chinese-language phishing pages outside of the Google Play Store.

Although initially targeting Chinese speakers, the malicious software does not have regional limitations and can adapt to different languages, indicating a potential threat to users worldwide.

The perpetrators of the FakeWallet campaign appear to be connected to the SparkKitty malware, based on similarities in their distribution methods and focus on cryptocurrency wallets.

Apple has been informed of these malicious applications and has begun removing them from the App Store to protect its users.

Security Week News Tags:App Store, crypto apps, Cryptocurrency, Cybersecurity, digital wallets, fake apps, iOS security, Kaspersky, Phishing, Threat Actors

Post navigation

Previous Post: Negotiator Admits Role in 2023 BlackCat Ransomware Scandal
Next Post: Enhancing SOC Maturity with Integrated Threat Intelligence

Related Posts

Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Security Week News
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Security Week News
ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets Security Week News
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Security Week News
Securonix Acquires Threat Intelligence Firm ThreatQuotient Securonix Acquires Threat Intelligence Firm ThreatQuotient Security Week News
Louis Vuitton Data Breach Hits Customers in Several Countries Louis Vuitton Data Breach Hits Customers in Several Countries Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark