Quick Facts
- Category: Finance & Crypto
- Published: 2026-05-03 01:36:49
- 8 Things You Need to Know About the Android Browser That Replaced Chrome, Firefox, and Samsung Internet
- Tracking Tesla's Unsupervised Robotaxi Fleet: A Step-by-Step Guide to Understanding Growth Stagnation and Early Signs of Ramp-Up
- Microsoft Open-Sources Azure Integrated HSM to Let Anyone Verify Cloud Cryptographic Trust
- Exploring Ptyxis: The Modern Terminal Taking Over Linux
- Crafting User Research Narratives: A Three-Act Guide to Engaging Stakeholders
Introduction
In March 2026, cybersecurity researchers uncovered more than twenty phishing apps in the Apple App Store disguised as popular crypto wallets. These apps redirect users to browser pages that mimic the App Store and distribute trojanized versions of legitimate wallets, specifically engineered to hijack recovery phrases and private keys. The campaign has been active since at least fall 2025. This guide will help you identify and avoid these fraudulent apps, protecting your cryptocurrency assets.

What You Need
- An iPhone or iPad with iOS
- An Apple ID (preferably set to a region where official wallet apps are available, to reduce risk)
- Basic familiarity with cryptocurrency wallets (e.g., MetaMask, Ledger, Trust Wallet, Coinbase, TokenPocket, imToken, Bitpie)
- Optional: A security app such as Kaspersky that detects threats like HEUR:Trojan-PSW.IphoneOS.FakeWallet.*
Step-by-Step Guide
Step 1: Always Download Official Wallet Apps from Trusted Sources
Never search for a wallet app directly in the App Store if you can avoid it. Instead, go to the official website of the wallet provider (e.g., metamask.io, ledger.com) and find the official download link for iOS. This ensures you get the legitimate app. If you must use the App Store, verify the app’s developer name against the official one.
Step 2: Check the App Name and Icon for Typosquatting
Scammers often use slightly misspelled names (e.g., “Ledger Wallet” instead of “Ledger Live”) or icons that look nearly identical to the original. Compare the app name and icon carefully. If anything seems off – like a different color shade, an extra pixel, or a typo – do not download it.
Step 3: Examine the Developer Information
Tap on the app in the App Store and scroll down to see the developer name. Legitimate wallets are published by well-known companies: e.g., MetaMask by ConsenSys, Trust Wallet by Binance, etc. If the developer name seems random or unrelated, it is likely a phishing app.
Step 4: Scrutinize Promotional Screenshots and Descriptions
Phishing apps often include custom screenshots that claim “official wallet unavailable in the App Store” and direct you to download the real wallet through the app itself. These are red flags. Also look for grammatical errors, odd phrasing, or images that seem mismatched. The fake apps may also have a stub – a functional place holder like a game, calculator, or task planner – to appear legitimate. If the app’s functionality doesn’t match the description of a crypto wallet, reject it.
Step 5: Read Reviews and Ratings Carefully
Fake apps often have no reviews or only recent positive reviews that sound generic. Look for detailed negative reviews mentioning phishing or stolen funds. Also check the total number of ratings – if a popular wallet has only a few hundred ratings, it is suspicious.
Step 6: Watch for Unusual Behavior After Launch
When you open the app, if it immediately redirects you to a web page that looks like the App Store or a browser page asking you to download another file, close the app and delete it. Legitimate wallet apps run natively without redirecting to external downloads. The fake apps use this trick to distribute trojanized versions.

Step 7: Never Enter Recovery Phrases or Private Keys
No legitimate wallet app will ask you to enter your recovery phrase or private key within the app itself – especially not on a web page that opened from the app. If you see such a request, it is a scam. Only enter these credentials on the official app’s interface, and only when restoring a wallet.
Step 8: Use Security Software to Detect Threats
Install a reputable mobile security app like Kaspersky. Kaspersky detects these fake wallet apps as HEUR:Trojan-PSW.IphoneOS.FakeWallet.* and HEUR:Trojan.IphoneOS.FakeWallet.*. Run scans periodically, especially after downloading new apps.
Step 9: Keep iOS Updated and Monitor Account Activity
Apple regularly patches security vulnerabilities, so always install the latest iOS updates. Additionally, monitor your cryptocurrency wallet addresses for unauthorized transactions. If you suspect your wallet has been compromised, transfer funds to a new wallet immediately.
Step 10: Report Suspicious Apps to Apple
If you find a fake wallet app, report it to Apple using the “Report a problem” link in the App Store or via Apple’s support channel. In the March 2026 campaign, Kaspersky reported 26 phishing apps, and several were removed. Your report can help protect others.
Tips for Staying Safe
- Use a dedicated device for crypto transactions – an old iPhone with no other apps reduces exposure.
- Enable two-factor authentication on your Apple ID to prevent unauthorized app downloads.
- Bookmark official wallet websites so you never rely on search results.
- Be extra cautious in regions where official wallet apps are restricted – scammers target users who cannot access the real apps. For example, if your Apple ID is set to China, you may see more of these phishing apps.
- Double-check any app that claims the official wallet is “unavailable” – that is a common social engineering tactic.
- Review our steps from Step 1 onwards before every download.
By following this guide, you can significantly reduce the risk of falling victim to crypto wallet phishing apps. Stay vigilant and always verify before you trust.