Security researchers at Kaspersky have uncovered a significant malware campaign on Apple's App Store, identifying 26 malicious applications collectively known as FakeWallet. These apps successfully bypassed Apple's review process and were available for download since at least the fall of 2025. The apps were designed to impersonate legitimate, popular cryptocurrency wallets such as MetaMask, Coinbase, and Trust Wallet. Their sole purpose was to deceive users into entering their recovery phrases or private keys, which were then exfiltrated to attacker-controlled servers, giving the criminals full control over the victims' crypto assets. While the campaign appeared to focus on the Chinese market, the apps were globally available. Apple has since removed the fraudulent applications.
The FakeWallet campaign represents a sophisticated effort to abuse the trust users place in the official App Store ecosystem. The threat actors created applications that closely mimicked the branding and user interface of well-known crypto wallets, including Bitpie, TokenPocket, and Ledger.
The campaign was particularly effective in China, where government restrictions prevent many official crypto wallet apps from being listed on the regional App Store. This created a demand vacuum that the attackers exploited. According to researchers, upon launch, some of the fake apps would redirect users to web pages that appeared to be part of the App Store but instead distributed trojanized versions of the wallet software.
The core malicious functionality involved intercepting the user's secret recovery phrase or private key during the wallet import or creation process. Once this sensitive data was captured, it was sent to the attackers, allowing them to drain the associated wallets of all funds.
The FakeWallet campaign employed several techniques to achieve its goals and evade detection:
T1036 - Masquerading), where the malicious apps used icons, names, and descriptions nearly identical to their legitimate counterparts to fool users.T1476 - Deliver Malicious App via Other Means. This bypass of Apple's vetting process is a significant component of the campaign's success.T1644 - Steal Application Access Token. The apps presented a seemingly legitimate interface for importing an existing wallet, which was simply a form to capture and exfiltrate the user's secrets.T1566 - Phishing) by exploiting user trust in the App Store and their desire to access popular but regionally unavailable applications.This incident serves as a stark reminder that no app store is completely immune to malicious applications. The curation and review process is a significant deterrent, but determined attackers can still find ways to circumvent it.
The direct impact on victims is the total and irreversible loss of their cryptocurrency assets. Once a private key or seed phrase is compromised, the attacker has complete control and can transfer all funds to their own wallets. The broader impact includes a significant erosion of trust in the security of mobile app ecosystems, even highly curated ones like Apple's App Store. It highlights the persistent risk to cryptocurrency users and the need for extreme caution when managing digital assets on mobile devices. For Apple, it represents a reputational blow and may lead to a re-evaluation of its app review policies, especially for financial and cryptocurrency-related applications.
While 26 specific apps were identified, their names were not listed in the provided source articles.
Users can hunt for these types of malicious apps with the following methods:
Developer Name MismatchLow Review Count / Fake ReviewsRedirects outside App StoreFor users, detection is primarily a manual process of vigilance before downloading.
Apple has already responded by removing the 26 identified apps from the App Store. Users who have downloaded any suspicious wallet app should immediately transfer any funds to a new, secure wallet (preferably a hardware wallet) whose seed phrase has never been entered digitally, and then delete the malicious app.
Protecting against this threat requires a combination of user awareness and best practices for cryptocurrency security:
D3-UBA: User Behavior Analysis in a preventative context.Educating users on how to verify application authenticity and the critical importance of never entering a seed phrase into a digital device is the primary defense.
While not a direct mitigation for this attack, encouraging users to use hardware wallets is a form of secure configuration for managing crypto assets.
Mapped D3FEND Techniques:
The most effective countermeasure against the FakeWallet campaign is preventative user education, which is a form of influencing user behavior. Users must be trained to adopt a zero-trust mindset when downloading financial applications, even from trusted stores like Apple's. Key training points include: 1) Always verifying the app developer's name against the official company. 2) Navigating to the official product website (e.g., metamask.io) and using their direct link to the App Store listing, rather than relying on search. 3) Treating their cryptocurrency seed phrase like a physical key to a bank vault—it should never be typed, photographed, or stored digitally. This behavioral change is the last and most critical line of defense when technical controls fail.
The FakeWallet campaign began, with malicious apps appearing on the Apple App Store.
Security researchers disclosed the campaign, and Apple subsequently removed the 26 identified apps.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats