The mobile app store hides a crisis: counterfeit Crypto Assets applications are stealing user assets on a large scale.

robot
Abstract generation in progress

Crypto Assets Applications Run Rampant: Unveiling the Security Risks of Mobile App Stores

In recent years, with the popularity of Crypto Assets, various related applications have sprung up like mushrooms after rain in mobile application stores. These applications provide users with diverse digital asset management tools, but they also bring potential security risks. This article will delve into the current state of counterfeit Crypto Assets software in mobile application stores, analyze the reasons for its emergence, and illustrate the potential harms these applications may cause through examples.

The Current Situation of Counterfeit Crypto Assets Applications

Taking a well-known multi-chain NFT marketplace platform as an example, this platform enjoys a good reputation in the Crypto Assets field, thus becoming a target for criminals to impersonate. On March 7, the platform's team members discovered counterfeit applications appearing in mobile app stores. These applications mimic the official website and user interface, enticing users to download and use them, thereby obtaining sensitive information such as users' wallet private keys. Since the platform does not have an official application in the mobile app store, many users find it difficult to identify the authenticity of these counterfeit applications.

Another case involves a decentralized exchange based on a certain public chain encountering similar counterfeiting. Users downloaded counterfeit applications from the app store, connected their wallets, and granted authorization, resulting in theft of funds. Even more seriously, these applications can also steal users' mnemonic phrases, causing even greater losses.

Web3 Security Alert丨Counterfeit Crypto Assets Software Floods the Market, Exposing Hidden Traps in the App Store

In-depth Analysis: The Dangers of Certain DEX Imitation Applications

According to a victim's published scam address, we conducted an in-depth analysis. From January 11 to March 30, 2024, this address stole the mnemonic phrases of 298 suspected victims, involving a fund flow of up to 353.6 ETH and 330,500 USDT. The hacker exchanged the stolen various tokens into USDT through a certain DEX and then dispersed the funds across multiple addresses. Some of the funds have been transferred through cross-chain bridges or directly into a certain centralized exchange. Currently, this address has been labeled as a phishing address and ceased operations on March 30.

Web3 Security Alert丨Counterfeit Crypto Assets Software is Rampant, Exposing the Hidden Traps of the App Store

Reasons for the Proliferation of Counterfeit Applications

There are vulnerabilities in the review process.

Despite the strict review process of mobile app stores, vulnerabilities still exist. Malicious developers may exploit these vulnerabilities to temporarily pass off counterfeit or fraudulent apps. Once an app is listed, if it is used for malicious purposes, it may take some time to be detected and removed. Criminals take advantage of this time lag to rapidly spread malware.

Abuse of technical means

Some developers use advanced technical means to evade security detection. For example, by using techniques such as code obfuscation and dynamic content loading, they conceal the true intentions of the application, making it difficult for automated security detection tools to identify its fraudulent nature.

leveraging user trust

Fraudulent application developers mislead users into downloading and using their apps by imitating the appearance and names of well-known applications, taking advantage of users' trust in the brand. Because users generally believe that the apps in the app store have undergone strict screening, they may not conduct the necessary checks.

Prevention Suggestions

To address this issue, it is recommended to take the following measures:

  1. The app store should continuously improve the review process and enhance security standards.
  2. The official project team should promptly detect and report counterfeit applications.
  3. Users should carefully check the developer information, app ratings, and user feedback before downloading the application.
  4. When encountering suspicious applications, users should report them to the app store immediately.
  5. Strengthen user education and raise awareness of potential risks.

Through the joint efforts of all parties, we can create a safer mobile application environment for Crypto Assets users.

Web3 Security Alert丨Counterfeit Crypto Assets Software Flooding, Exposing the Hidden Traps of the App Store

APP-11.01%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Share
Comment
0/400
SilentObservervip
· 16h ago
It's not like we don't know there are dangers, yet we still want to take advantage of cheap deals.
View OriginalReply0
gas_fee_therapistvip
· 16h ago
In this day and age, who can get by without being a bit cautious?
View OriginalReply0
GasWastingMaximalistvip
· 16h ago
While others are studying candlestick charts, I am studying gas...
View OriginalReply0
StakeTillRetirevip
· 16h ago
play people for suckers play people for suckers No need to wait until tomorrow
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)