🎉 The #CandyDrop Futures Challenge is live — join now to share a 6 BTC prize pool!
📢 Post your futures trading experience on Gate Square with the event hashtag — $25 × 20 rewards are waiting!
🎁 $500 in futures trial vouchers up for grabs — 20 standout posts will win!
📅 Event Period: August 1, 2025, 15:00 – August 15, 2025, 19:00 (UTC+8)
👉 Event Link: https://www.gate.com/candy-drop/detail/BTC-98
Dare to trade. Dare to win.
The mobile app store hides a crisis: counterfeit Crypto Assets applications are stealing user assets on a large scale.
Crypto Assets Applications Run Rampant: Unveiling the Security Risks of Mobile App Stores
In recent years, with the popularity of Crypto Assets, various related applications have sprung up like mushrooms after rain in mobile application stores. These applications provide users with diverse digital asset management tools, but they also bring potential security risks. This article will delve into the current state of counterfeit Crypto Assets software in mobile application stores, analyze the reasons for its emergence, and illustrate the potential harms these applications may cause through examples.
The Current Situation of Counterfeit Crypto Assets Applications
Taking a well-known multi-chain NFT marketplace platform as an example, this platform enjoys a good reputation in the Crypto Assets field, thus becoming a target for criminals to impersonate. On March 7, the platform's team members discovered counterfeit applications appearing in mobile app stores. These applications mimic the official website and user interface, enticing users to download and use them, thereby obtaining sensitive information such as users' wallet private keys. Since the platform does not have an official application in the mobile app store, many users find it difficult to identify the authenticity of these counterfeit applications.
Another case involves a decentralized exchange based on a certain public chain encountering similar counterfeiting. Users downloaded counterfeit applications from the app store, connected their wallets, and granted authorization, resulting in theft of funds. Even more seriously, these applications can also steal users' mnemonic phrases, causing even greater losses.
In-depth Analysis: The Dangers of Certain DEX Imitation Applications
According to a victim's published scam address, we conducted an in-depth analysis. From January 11 to March 30, 2024, this address stole the mnemonic phrases of 298 suspected victims, involving a fund flow of up to 353.6 ETH and 330,500 USDT. The hacker exchanged the stolen various tokens into USDT through a certain DEX and then dispersed the funds across multiple addresses. Some of the funds have been transferred through cross-chain bridges or directly into a certain centralized exchange. Currently, this address has been labeled as a phishing address and ceased operations on March 30.
Reasons for the Proliferation of Counterfeit Applications
There are vulnerabilities in the review process.
Despite the strict review process of mobile app stores, vulnerabilities still exist. Malicious developers may exploit these vulnerabilities to temporarily pass off counterfeit or fraudulent apps. Once an app is listed, if it is used for malicious purposes, it may take some time to be detected and removed. Criminals take advantage of this time lag to rapidly spread malware.
Abuse of technical means
Some developers use advanced technical means to evade security detection. For example, by using techniques such as code obfuscation and dynamic content loading, they conceal the true intentions of the application, making it difficult for automated security detection tools to identify its fraudulent nature.
leveraging user trust
Fraudulent application developers mislead users into downloading and using their apps by imitating the appearance and names of well-known applications, taking advantage of users' trust in the brand. Because users generally believe that the apps in the app store have undergone strict screening, they may not conduct the necessary checks.
Prevention Suggestions
To address this issue, it is recommended to take the following measures:
Through the joint efforts of all parties, we can create a safer mobile application environment for Crypto Assets users.