The Rise of Fake Crypto Wallets
Recent investigations by cybersecurity experts have shed light on a scam that’s more chicken than a clucking hen—Trojan applications masquerading as popular cryptocurrency wallets. If you thought your crypto was safe in your digital pocket, you might want to check your wallet again!
How This Scheme Operates
The malicious operation zeroes in on unsuspecting mobile users, targeting Android and iOS platforms. Like a magician revealing their secrets, let’s pull back the curtain. These deceptive apps find their way into devices when users download them from bogus websites posing as legitimate wallets such as MetaMask, Coinbase, and Trust Wallet.
The Grim Findings
According to research from cybersecurity firm ESET, there are at least 13 fake versions of the Jaxx Liberty wallet lurking in the Google Play Store—apps that had been downloaded over a thousand times until Google booted them out. Yet, the internet is a vast ocean, and many fraudulent applications still swim through the depths of other sites and social media.
Where Are These Apps Coming From?
ESET traced the fingers behind this cybercrime back to social media groups on platforms like Facebook and Telegram, where the bad actors operate with the intent of absconding with users’ crypto assets. Their target demographic primarily seems to be Chinese users, leveraging Chinese websites to lure in their victims. Clearly, as if we needed more reasons to be skeptical of that random Facebook group invite!
How They Get You
These fake apps are crafty! They employ different strategies depending on the platform. If you’re an Android user, you might encounter a cleverly disguised prompt to install wallets for new cryptocurrencies you’ve never traded. On the iPhone side of the river, they sneak in using arbitrary code-signing certificates, dodging Apple’s usual vetting process. They can even create the illusion of being innocent twins—both the legit wallet and the Trojan wallet installed side by side!
Lessons from Lukáš Štefanko
Lukáš Štefanko, the blanco detective of this tale, warns that besides the obvious trojan threat, there are other ways victims can lose their hard-earned crypto. For example, if users unwittingly send seed phrases through unsecured connections, those funds could fall prey not just to the operators of this scheme but to anyone else eavesdropping on the same network.
“You might think you’re sharing secrets, but it’s really like posting on a billboard for thieves,”
he might as well say.
Best Practices for Crypto Investors
ESET strongly recommends that cryptocurrency aficionados only download wallet apps from reliable sources tied to the official websites of the exchanges or companies behind them. It’s like hitting the brakes before driving off a cliff—better safe than sorry.
The Bigger Picture
In the ever-evolving dance of cybersecurity, threats like cryptojacking are becoming more prevalent. A fascinating development came from Google Cloud earlier this year, unveiling tools that scan for malware designed to hijack resources for mining digital currencies. According to a report by Chainalysis, cryptojacking constituted a whopping 73% of the value taken by malware-related wallets between 2017 and 2021. Talk about a digital gold rush!