{"id":25495,"date":"2026-04-27T20:20:35","date_gmt":"2026-04-27T16:20:35","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25495"},"modified":"2026-04-27T20:20:35","modified_gmt":"2026-04-27T16:20:35","slug":"ios-macos-fake-crypto-apps","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/25495\/","title":{"rendered":"Crypto thieves ramping up attacks on Apple users"},"content":{"rendered":"<p>Even if you keep your crypto assets in a cold wallet and use Apple devices \u2014 which enjoy a strong reputation for security \u2014 cybercriminals may still find a way to swipe your funds. These bad actors are combining well-known tricks into new attack chains \u2014 including baiting victims right inside the App Store.<\/p>\n<h2>Crypto-wallet clones<\/h2>\n<p>This past March, we discovered phishing apps at the top of the Chinese App Store charts with icons and names mimicking popular crypto-wallet management tools. Because regional restrictions block several official wallet apps from the Chinese App Store, attackers have stepped in to fill the void. They created fake apps using icons similar to the originals and names with intentional typos \u2014 likely to bypass App Store moderation and deceive users.<\/p>\n<div id=\"attachment_55668\" style=\"width: 1565px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201512\/ios-macos-fake-crypto-apps-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55668\" class=\"wp-image-55668 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201512\/ios-macos-fake-crypto-apps-01.jpg\" alt=\"Phishing apps in the App Store appearing in search results for Ledger Wallet (formerly Ledger Live)\" width=\"1555\" height=\"752\"><\/a><p id=\"caption-attachment-55668\" class=\"wp-caption-text\">Phishing apps in the App Store appearing in search results for Ledger Wallet (formerly Ledger Live)<\/p><\/div>\n<p>Beyond these, we found a number of apps with names and icons that had nothing to do with cryptocurrency. However, their promotional banners claimed they could be used to download and install official wallet apps that are otherwise unavailable in the regional App Store.<\/p>\n<div id=\"attachment_55666\" style=\"width: 1778px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201518\/ios-macos-fake-crypto-apps-02-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55666\" class=\"wp-image-55666 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201518\/ios-macos-fake-crypto-apps-02-EN.jpg\" alt=\"Banners on app pages claiming they can be used to download the official TokenPocket app, which is missing from the local App Store\" width=\"1768\" height=\"1409\"><\/a><p id=\"caption-attachment-55666\" class=\"wp-caption-text\">Banners on app pages claiming they can be used to download the official TokenPocket app, which is missing from the local App Store<\/p><\/div>\n<p>In total, we identified 26 phishing apps mimicking the following popular wallets:<\/p>\n<ul>\n<li>MetaMask<\/li>\n<li>Ledger<\/li>\n<li>Trust Wallet<\/li>\n<li>Coinbase<\/li>\n<li>TokenPocket<\/li>\n<li>imToken<\/li>\n<li>Bitpie<\/li>\n<\/ul>\n<p>A few other very similar apps didn\u2019t contain phishing functionality yet, but all signs point to them being linked to the same attackers. It\u2019s likely they plan to add malicious features in future updates.<\/p>\n<p>To get these apps cleared for the App Store, the developers added basic functionality, such as a game, a calculator, or a task planner.<\/p>\n<p>Installing any of these clones is the first step toward losing your crypto assets. While the apps themselves don\u2019t steal cryptocurrency, seed phrases, or passwords, they serve as bait that builds user trust by virtue of being listed on the official App Store. Once installed and launched, however, the app opens a phishing site in the victim\u2019s browser, designed to look like the App Store, which then prompts the user to install a compromised version of the relevant crypto wallet. The attackers have created multiple versions of these malicious modules, each tailored to a specific wallet. You can find a detailed technical breakdown of this attack in our <a href=\"https:\/\/securelist.com\/fakewallet-cryptostealer-ios-app-store\/119474\/\" target=\"_blank\" rel=\"noopener\">Securelist post<\/a>.<\/p>\n<p>A victim who falls for the ruse is first prompted to install a provisioning profile, which allows apps to be sideloaded onto an iPhone outside the App Store. The profile is then used to install the malicious app itself.<\/p>\n<div id=\"attachment_55669\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201522\/ios-macos-fake-crypto-apps-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55669\" class=\"wp-image-55669 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201522\/ios-macos-fake-crypto-apps-03.jpg\" alt=\"A fake App Store site prompting the user to install an app masquerading as Ledger Wallet\" width=\"591\" height=\"1156\"><\/a><p id=\"caption-attachment-55669\" class=\"wp-caption-text\">A fake App Store site prompting the user to install an app masquerading as Ledger Wallet<\/p><\/div>\n<p>In the example above, the malware is built on the original Ledger app with integrated Trojan functionality. The app looks identical to the original, but when connected to a hardware wallet, it displays a window requiring a seed phrase, supposedly to restore access. This is not standard procedure: typically, you only need to enter a PIN \u2014 never a recovery phrase. If a victim is deceived by the app\u2019s apparent legitimacy and enters their seed phrase, it\u2019s immediately sent to the attackers\u2019 server \u2014 granting them full access to the victim\u2019s crypto assets.<\/p>\n<h2>Sideloading outside the App Store<\/h2>\n<p>A critical component of this scheme involves installing malware on the victim\u2019s iPhone by bypassing the App Store and its verification process. This is executed much like the <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/53675\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkKitty iOS infostealer<\/a> we discovered previously. The attackers managed to gain access to the <a href=\"https:\/\/developer.apple.com\/programs\/enterprise\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">Apple Developer Enterprise Program<\/a>. For just US$299 a year \u2014 and following an interview and corporate verification \u2014 this program allows entities to issue their own configuration profiles and apps for direct download to user devices without ever publishing them in the App Store.<\/p>\n<div id=\"attachment_55670\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201526\/ios-macos-fake-crypto-apps-04.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55670\" class=\"wp-image-55670 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201526\/ios-macos-fake-crypto-apps-04.jpg\" alt=\"To install the app, the victim must first install a configuration profile that enables the malware to be downloaded directly, bypassing the App Store. Note the green verification checkmark\" width=\"591\" height=\"760\"><\/a><p id=\"caption-attachment-55670\" class=\"wp-caption-text\">To install the app, the victim must first install a configuration profile that enables the malware to be downloaded directly, bypassing the App Store. Note the green verification checkmark<\/p><\/div>\n<p>In general, enterprise profiles are designed to allow organizations to deploy internal apps to employees\u2019 devices. These apps don\u2019t require App Store publication and can be installed on an unlimited number of devices. Unfortunately, this feature is often abused. These profiles are frequently used for software that fails to meet Apple\u2019s policies, such as online casinos, pirated mods, and, of course, malware.<\/p>\n<p>This is precisely why the fake site mimicking the Apple Store prompts the user to install a configuration profile before delivering the app signed by that profile.<\/p>\n<h2>Stealing cryptocurrency via macOS apps and extensions<\/h2>\n<p>Many crypto owners prefer managing their wallets on a computer rather than a smartphone \u2014 often choosing Macs for the task. It\u2019s no surprise, then, that most popular macOS infostealers target crypto-wallet data in one way or another. Recently, however, a new malicious tactic has been gaining traction: in addition to stealing saved data, attackers are embedding phishing dialogs directly into legitimate wallet applications already installed on users\u2019 computers. Earlier this year, the <a href=\"https:\/\/www.cloudsek.com\/blog\/inside-macsyncs-script-driven-stealer-and-hardware-wallet-app-trojanization\" target=\"_blank\" rel=\"noopener nofollow\">MacSync infostealer<\/a> adopted this functionality. It infiltrates systems via <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">ClickFix attacks<\/a>: users searching for software are lured to fake sites with fraudulent instructions to install the app by running commands in Terminal. This executes the infostealer, which scrapes passwords and cookies saved in Chrome, chats from popular messengers, and data from browser-based crypto-wallet extensions.<\/p>\n<p>But the most interesting part is what happens next. If the victim already has a legitimate Trezor or Ledger app installed, the infostealer downloads additional modules and\u2026 swaps out fragments of the app with its own trojanized code. The malware then re-signs the modified file so that after these \u201cfixes\u201d are made, Gatekeeper (a built-in protection mechanism in macOS) allows the application to run without an additional permission request from the user. While this trick doesn\u2019t always work, it\u2019s effective for simpler apps built on the popular <a href=\"https:\/\/www.kaspersky.com\/blog\/electron-framework-security-issues\/49035\/\" target=\"_blank\" rel=\"noopener nofollow\">Electron framework<\/a>.<\/p>\n<div id=\"attachment_55671\" style=\"width: 1062px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201530\/ios-macos-fake-crypto-apps-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55671\" class=\"wp-image-55671 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/04\/27201530\/ios-macos-fake-crypto-apps-05.jpg\" alt=\"The trojanized app prompts the user for the seed phrase of their wallet\" width=\"1052\" height=\"602\"><\/a><p id=\"caption-attachment-55671\" class=\"wp-caption-text\">The trojanized app prompts the user for the seed phrase of their wallet<\/p><\/div>\n<p>When the trojanized app is opened, it fakes an error and initiates a \u201crecovery process\u201d, prompting the user for their wallet seed phrase.<\/p>\n<p>Besides MacSync, the developers behind other popular macOS infostealers have adopted this same trojanization approach. We previously detailed a <a href=\"https:\/\/securelist.com\/new-macos-backdoor-crypto-stealer\/111778\/\" target=\"_blank\" rel=\"noopener\">similar mechanism used to compromise Exodus and Bitcoin-Qt wallets<\/a>.<\/p>\n<h2>How to keep your crypto assets safe<\/h2>\n<p>Time and again, attackers have proved that no gadget is truly invincible. With so many developers and cryptocurrency users preferring macOS and iOS, threat actors have designed and deployed industrial-scale attacks for both platforms. Staying safe requires in-depth defense backed by skepticism and vigilance.<\/p>\n<ul>\n<li>Download apps only from trusted sources: either the developer\u2019s official website or their App Store page. Since malware can slip even into official stores, always verify the app\u2019s publisher.<\/li>\n<li>Check the app\u2019s rating, publication date, and download counter.<\/li>\n<li>Read the reviews \u2014 especially the negative ones. Sort reviews by date to evaluate the latest version. Attackers often start with a perfectly innocent app that earns high ratings before introducing malicious functionality in a later update.<\/li>\n<li>Never copy and paste commands into your Terminal unless you\u2019re 100% certain what they do. These attacks have become very popular lately, often disguised as installation steps for <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-ai-agents-infostealers\/55412\/\" target=\"_blank\" rel=\"noopener nofollow\">AI apps<\/a> like Claude Code or OpenClaw.<\/li>\n<li>Use a comprehensive security system on all your computers and smartphones. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>. This goes a long way to mitigate the risk of visiting phishing sites or installing malicious apps.<\/li>\n<li>Never enter your seed phrase into a hardware wallet app, on a website, or in a chat. In every scenario, whether migrating to a new wallet, reinstalling apps, or recovering a wallet, the seed phrase should be entered <strong>exclusively on the hardware device itself<\/strong> \u2014 never in a mobile or desktop app.<\/li>\n<li>Always verify the recipient\u2019s address on the hardware wallet\u2019s screen to prevent attacks involving address swapping.<\/li>\n<li>Store your seed phrases in the most secure way possible, such as <a href=\"https:\/\/coincodex.com\/article\/23147\/best-metal-crypto-wallets-for-seed-phrase-storage\/\" target=\"_blank\" rel=\"noopener nofollow\">on a metal plate<\/a> or in a sealed envelope in a safe deposit box. It\u2019s best not to store them on a computer at all, but if that\u2019s your only option, use a secure, encrypted vault like <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>.<\/li>\n<\/ul>\n<blockquote><p>Still believe that Apple devices are bulletproof? Think again as you read the following:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/55622\/\" target=\"_blank\" rel=\"noopener nofollow\">The iPhone \u2014 invincible no more: a look at DarkSword and Coruna<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/55463\/\" target=\"_blank\" rel=\"noopener nofollow\">Predator vs. iPhone: the art of invisible surveillance<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/whisperpair-blueooth-headset-location-tracking\/55162\/\" target=\"_blank\" rel=\"noopener nofollow\">Are your Bluetooth headphones spying on you?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/53443\/\" target=\"_blank\" rel=\"noopener nofollow\">AirBorne: Attacks on Apple devices through vulnerabilities in AirPlay<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/banshee-stealer-targets-macos-users\/52933\/\" target=\"_blank\" rel=\"noopener nofollow\">Banshee: A stealer targeting macOS users<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"premium-geek\" value=\"23742\">\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve discovered over two dozen phishing apps mimicking popular crypto wallets right in the official App Store. Here&#8217;s a breakdown of the new waves of attacks targeting iPhone and Mac users and their crypto holdings.<\/p>\n","protected":false},"author":2749,"featured_media":25502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[14,2829,2641,1505,2799,1061,1328,695,2151,521,692],"class_list":{"0":"post-25495","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-clickfix","10":"tag-crypto-wallets","11":"tag-cryptocurrencies","12":"tag-infostealers","13":"tag-ios","14":"tag-macos","15":"tag-scam","16":"tag-stealers","17":"tag-threats","18":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/25495\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-macos-fake-crypto-apps\/30449\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-macos-fake-crypto-apps\/30293\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-macos-fake-crypto-apps\/41766\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/55665\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-macos-fake-crypto-apps\/30602\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-macos-fake-crypto-apps\/36180\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-macos-fake-crypto-apps\/35831\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2749"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25495"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25495\/revisions"}],"predecessor-version":[{"id":25503,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25495\/revisions\/25503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25502"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}