Malicious Ledger Live macOS app on Apple App Store facilitates $9.5M crypto theft via seed phrase harvesting
Summary
Hide ▲
Show ▼
A fraudulent Ledger Live macOS application, distributed through Apple’s App Store under the publisher name ‘Leva Heal Limited,’ compromised approximately 50 users in early April 2026, resulting in the theft of $9.5 million in cryptocurrency assets. The illicit app tricked users into entering seed phrases, granting attackers full wallet control and enabling fund transfers to attacker-controlled addresses. The incident is part of the broader Apple App Store infiltration campaign dubbed FakeWallet, linked to the SparkKitty operation and active since at least fall 2025. Kaspersky identified 26 malicious apps impersonating major wallets (e.g., Ledger, MetaMask, Coinbase) to steal seed phrases and drain crypto assets, with malware delivered via libraries, injected code, or OCR-based recovery phrase theft. Some apps contained latent malicious features awaiting future activation, and the campaign’s modules lacked regional restrictions despite initial targeting of Chinese-speaking users. Apple began removing malicious apps after Kaspersky’s disclosure, freezing implicated KuCoin accounts until April 20, 2026. New details indicate the apps redirected users to fake App Store-like browser pages to distribute trojanized wallet versions, while some non-crypto apps (e.g., games, calculators) acted as placeholders to direct victims to official wallets under regulatory pretexts. Attackers used OCR modules to capture recovery phrases and employed sophisticated phishing tactics, including code hooking during entry and fake verification prompts, to maximize theft efficiency.
Timeline
-
14.04.2026 19:37 4 articles · 10d ago
Malicious Ledger Live macOS app on Apple App Store leads to $9.5M crypto theft via seed phrase harvesting
A fraudulent Ledger Live application for macOS, distributed through Apple’s App Store under the publisher name ‘Leva Heal Limited,’ was used to trick users into entering seed phrases between April 8 and April 11, 2026. Attackers gained full wallet access, moving stolen assets across multiple networks before laundering via KuCoin-linked addresses tied to the ‘AudiA6’ mixing service. Apple removed the malicious app after user reports; KuCoin froze implicated accounts until April 20, 2026, with extension possible via law enforcement requests. The incident is now framed as part of a broader Apple App Store infiltration campaign (FakeWallet) linked to the SparkKitty operation, which deployed 26 malicious apps impersonating major wallets to steal seed phrases and drain cryptocurrency assets. Victims were lured via typosquatting, fake branding, and regional bypass tactics (e.g., disguising apps as games or calculators), with malware intercepting mnemonics via iOS provisioning profiles or phishing prompts. Malicious features in some apps were ‘waiting to be toggled on’ in future updates, and malware was delivered via libraries or injected directly into wallet source code. The campaign’s modules lacked regional restrictions despite initial focus on Chinese-speaking users, and a fake Ledger website hosted links to malicious apps alongside compromised Android wallet apps distributed via Chinese-language phishing pages. This update adds that the apps redirected users to fake App Store-like browser pages to distribute trojanized wallet versions, while some non-crypto apps (e.g., games, calculators) served as placeholders directing users to official wallets under false regulatory pretexts. Attackers used OCR modules to capture recovery phrases and employed sophisticated phishing tactics, including code hooking during entry and fake verification prompts, to maximize theft efficiency. Malware was delivered via malicious library injection or source-code modification, with payloads tailored to specific wallet targets.
Show sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
Information Snippets
-
The malicious Ledger Live macOS app was available on Apple’s App Store under the publisher name ‘Leva Heal Limited’ and not associated with Ledger’s official team.
First reported: 14.04.2026 19:373 sources, 3 articlesShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Victims entered seed/recovery phrases into the fake app, resulting in unauthorized access to their cryptocurrency wallets and subsequent fund transfers to attacker-controlled addresses.
First reported: 14.04.2026 19:373 sources, 3 articlesShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Total stolen amount across 50 victims reached approximately $9.5 million, with individual losses including $3.23M, $2.08M, and $1.95M.
First reported: 14.04.2026 19:372 sources, 2 articlesShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
-
Stolen funds were laundered via more than 150 KuCoin deposit addresses connected to the centralized mixing service ‘AudiA6’; KuCoin froze involved accounts until April 20, 2026.
First reported: 14.04.2026 19:373 sources, 3 articlesShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Ledger does not distribute a macOS app through Apple’s App Store; only an iOS-compatible version is officially available in the store, and a legitimate macOS desktop app is provided via Ledger’s website.
First reported: 14.04.2026 19:371 source, 1 articleShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
-
Apple removed the malicious app following multiple user reports; the timeline between initial compromise and removal spans approximately three days.
First reported: 14.04.2026 19:372 sources, 2 articlesShow sources
- Fake Ledger Live app on Apple’s App Store stole $9.5M in crypto — www.bleepingcomputer.com — 14.04.2026 19:37
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
-
A set of 26 malicious apps on Apple App Store impersonated popular wallets such as MetaMask, Coinbase, Trust Wallet, and OneKey to steal recovery or seed phrases and drain cryptocurrency assets
First reported: 21.04.2026 00:523 sources, 3 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
The threat actor used typosquatting and fake branding to imitate official products and lure users in China into downloading the apps
First reported: 21.04.2026 00:523 sources, 3 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
The attacker published the apps as games or calculator apps to bypass restrictions in China
First reported: 21.04.2026 00:523 sources, 3 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Kaspersky researchers named the campaign 'FakeWallet' and associated it with the SparkKitty operation active since last year
First reported: 21.04.2026 00:523 sources, 3 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
The fake apps redirected users to phishing pages designed to appear as legitimate crypto service portals
First reported: 21.04.2026 00:521 source, 1 articleShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
-
The apps used trojanized wallet apps via iOS provisioning profiles to sideload malware onto devices
First reported: 21.04.2026 00:521 source, 1 articleShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
-
The trojanized apps intercepted mnemonic phrases during wallet setup or recovery, encrypted them with RSA and Base64, and sent them to attackers
First reported: 21.04.2026 00:522 sources, 2 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
For cold wallets like Ledger, attackers relied on in-app phishing prompts to trick users into manually entering seed phrases via fake security verification screens
First reported: 21.04.2026 00:521 source, 1 articleShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
-
The campaign primarily targeted users in China, though the malware had no geographic restrictions
First reported: 21.04.2026 00:521 source, 1 articleShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
-
Apple removed all 26 FakeWallet apps from the App Store after Kaspersky’s responsible disclosure
First reported: 21.04.2026 00:523 sources, 3 articlesShow sources
- China's Apple App Store infiltrated by crypto-stealing wallet apps — www.bleepingcomputer.com — 21.04.2026 00:52
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
The FakeWallet campaign has been ongoing since at least fall 2025, with early detection of malicious apps in March 2026, primarily appearing in Chinese App Store search results.
First reported: 21.04.2026 17:052 sources, 2 articlesShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Kaspersky identified 26 phishing apps mimicking wallets such as Bitpie, Coinbase, imToken, Ledger, MetaMask, TokenPocket, and Trust Wallet, including some without direct cryptocurrency association but luring users with banners for unavailable official wallets.
First reported: 21.04.2026 17:052 sources, 2 articlesShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Malicious features in some apps were 'waiting to be toggled on' in future updates, indicating potential for broader activation beyond current phishing capabilities.
First reported: 21.04.2026 17:052 sources, 2 articlesShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Malware was delivered via libraries or injected directly into wallet source code, with functions designed to harvest recovery/seed phrases and hijack wallet restoration methods.
First reported: 21.04.2026 17:051 source, 1 articleShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
-
Two Ledger implants were identified for targeting cold wallets, and a fake Ledger website hosted links to malicious apps alongside compromised Android wallet apps distributed via Chinese-language phishing pages.
First reported: 21.04.2026 17:051 source, 1 articleShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
-
The campaign’s malicious modules lack regional restrictions, and phishing notifications adapt to app language, suggesting potential targeting beyond China despite initial focus on Chinese speakers.
First reported: 21.04.2026 17:052 sources, 2 articlesShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Apple was notified and initiated removal of malicious apps after Kaspersky's disclosure.
First reported: 21.04.2026 17:051 source, 1 articleShow sources
- Dozens of Malicious Crypto Apps Land in Apple App Store — www.securityweek.com — 21.04.2026 17:05
-
Malicious apps redirected users to browser pages resembling the App Store to distribute trojanized wallet versions after initial launch
First reported: 24.04.2026 14:481 source, 1 articleShow sources
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Some infected apps mimicked non-crypto services (e.g., games, calculators) as placeholders to direct users to the official wallet app, claiming regulatory unavailability in the App Store
First reported: 24.04.2026 14:481 source, 1 articleShow sources
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Attackers used OCR modules within some infected apps to steal wallet recovery phrases via optical character recognition
First reported: 24.04.2026 14:481 source, 1 articleShow sources
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
Malware was delivered via injected malicious libraries or direct source-code modification, with payloads tailored to specific wallet targets
First reported: 24.04.2026 14:481 source, 1 articleShow sources
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
-
The campaign employed sophisticated phishing notifications to trick users into revealing mnemonics, including hooking code during phrase entry or serving fake verification pages
First reported: 24.04.2026 14:481 source, 1 articleShow sources
- 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases — thehackernews.com — 24.04.2026 14:48
Similar Happenings
Six Android Malware Families Target Pix, Banking Apps, and Crypto Wallets
Six Android malware families continue to target Pix payments, banking apps, and cryptocurrency wallets, with Mirax expanding its capabilities beyond financial theft. The Mirax trojan now integrates residential proxy functionality, enabling attackers to route malicious traffic through compromised devices and evade geographic restrictions. Mirax, previously identified as a banking trojan offered through a malware-as-a-service ecosystem, now operates under a restricted MaaS model targeting Spanish-speaking users with campaigns exceeding 200,000 accounts via social media advertisements. It provides full real-time device control, dynamic fake overlays fetched from C2 servers, and surveillance features including keylogging and lock screen detail collection. Distribution relies on social engineering via illegal streaming app promotions, with malware hosted on GitHub and device evasion techniques. Compromised devices are repurposed as residential proxies for broader cybercriminal activities, including account takeovers and anonymized network attacks.
ZeroDayRAT Malware Targets Android and iOS Devices
A new commercial spyware platform, ZeroDayRAT, is being advertised on Telegram, offering full remote control over compromised Android (versions 5–16) and iOS (up to version 26) devices. The malware provides extensive surveillance capabilities, including real-time tracking, data theft, and financial fraud. It can log app usage, SMS messages, and notifications, activate cameras and microphones, and steal cryptocurrency and banking credentials. ZeroDayRAT is marketed through Telegram channels and infections are initiated by persuading victims to install malicious binaries via smishing, phishing emails, counterfeit app stores, and links shared through WhatsApp or Telegram. The malware includes a dedicated web-based dashboard displaying device details, app usage, SMS messages, and live activity timeline. It also includes a crypto stealer and targets online banking apps, UPI platforms, and payment services like Apple Pay and PayPal. The malware is sold openly on Telegram with access to a panel featuring sales, customer support, and platform updates channels. ZeroDayRAT support spans Android 5 through 16 and iOS up to 26, and it provides a complete overview of the phone's makeup, including device model, SIM, location data, carrier info, live activity timeline, and recent SMS messages. The malware includes features such as SMS control, keylogger, microphone feed, screen recorder, bank stealer, and crypto stealer. ZeroDayRAT is priced at $2,000, indicating higher-than-average ambitions and targeting specific individuals or enterprises. The malware represents a convergence of nation-state-level capabilities with criminal economics, widening the target market for surveillance malware.
New Android Malware Families FvncBot, SeedSnatcher, and Enhanced ClayRat Target Financial and Cryptocurrency Data
Researchers have identified three new or enhanced Android malware families: FvncBot, SeedSnatcher, and an upgraded version of ClayRat. FvncBot targets Polish mobile banking users with keylogging, web-inject attacks, and hidden virtual network computing (HVNC) capabilities. SeedSnatcher steals cryptocurrency wallet seed phrases and intercepts SMS messages for 2FA codes. The updated ClayRat now abuses accessibility services for full device takeover, including screen recording and notification harvesting. These malware families use advanced techniques to evade detection and escalate privileges.
GlassWorm malware targets OpenVSX, VS Code registries
GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, with the latest iteration leveraging Solana dead drops for C2, a novel browser extension for surveillance, and a shift into the Model Context Protocol (MCP) ecosystem. The campaign now delivers a .NET binary that targets Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data, executes arbitrary code, and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline to perform session surveillance on cryptocurrency platforms like Bybit and harvest extensive browser data. Additionally, threat actors have begun distributing malicious payloads via npm packages impersonating the WaterCrawl MCP server, marking GlassWorm’s first confirmed incursion into the AI-assisted development ecosystem. Recent innovations in the GlassWorm campaign include the introduction of a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker', which masquerades as WakaTime. This dropper installs platform-specific Node.js native addons compiled from Zig code that execute outside the JavaScript sandbox with full OS-level access, enabling the threat actor to stealthily infect all IDEs on a developer's machine—including VS Code, VSCodium, Positron, Cursor, and Windsurf. The dropper then downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs. The second-stage extension avoids execution on Russian systems, communicates with the Solana blockchain for C2, exfiltrates data, and deploys an information-stealing RAT that ultimately installs a malicious Google Chrome extension. Users who installed the malicious extensions should assume compromise and rotate all secrets immediately. The GlassWorm campaign remains a persistent supply chain threat impacting multiple ecosystems including npm, PyPI, GitHub, and Open VSX. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. The Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new large-scale social engineering campaign has emerged, using fake VS Code security alerts posted in GitHub Discussions to distribute malware. The campaign automates posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links in these posts redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers as part of the broader GlassWorm malware campaign.
Klopatra Android Trojan Conducts Nighttime Bank Transfers
A new Android banking malware, Massiv, is posing as an IPTV app to steal digital identities and access online banking accounts. The malware targets users in Spain, Portugal, France, and Turkey, with a particular focus on a Portuguese government app connected to Chave Móvel Digital. Massiv uses screen overlays, keylogging, SMS interception, and remote control to obtain sensitive data and can open new accounts in the victim's name for money laundering and loans. The malware provides two remote control modes: screen live-streaming and UI-tree mode, which extracts structured data from the Accessibility Service. This trend of using IPTV apps as lures for Android malware infections has increased over the past eight months. Previously, the Klopatra Android Trojan was identified, capable of performing unauthorized bank transfers while the device is inactive. Klopatra targets users in Italy and Spain, with over 3,000 devices infected. It disguises itself as the Mobdro streaming app and IPTV applications, leveraging their popularity to bypass security measures. The malware employs advanced techniques to evade detection and analysis, including anti-sandboxing methods, a commercial packer, and Hidden Virtual Network Computing (VNC) for remote control. Klopatra operates during nighttime hours, draining victims' bank accounts without alerting them.