Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      I ran with the Apple Watch and Samsung Watch 8 – here’s the better AI coach

      July 26, 2025

      8 smart home gadgets that instantly upgraded my house (and why they work)

      July 26, 2025

      I tested Panasonic’s new affordable LED TV model – here’s my brutally honest buying advice

      July 26, 2025

      OpenAI teases imminent GPT-5 launch. Here’s what to expect

      July 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      NativePHP Is Entering Its Next Phase

      July 26, 2025
      Recent

      NativePHP Is Entering Its Next Phase

      July 26, 2025

      Medical Card Generator Android App Project Using SQLite

      July 26, 2025

      The details of TC39’s last meeting

      July 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025
      Recent

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025

      The next time you look at Microsoft Copilot, it may look back — but who asked for this?

      July 26, 2025

      5 Open Source Apps You Can use for Seamless File Transfer Between Linux and Android

      July 26, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Over 20 Malicious Crypto Wallet Apps Found on Google Play, CRIL Warns

    Over 20 Malicious Crypto Wallet Apps Found on Google Play, CRIL Warns

    June 9, 2025

    crypto phishing

    Cyble Research and Intelligence Labs (CRIL) has recently uncovered a malicious crypto phishing campaign where more than 20 malicious applications on the Google Play Store were designed to target crypto wallet users with phishing schemes. These deceptive apps impersonate well-known wallet platforms and lure users into revealing their sensitive mnemonic phrases, effectively handing over control of their digital assets. 

    Malicious Apps Mimic Trusted Crypto Wallets 

    According to CRIL’s report, the phishing apps impersonated popular crypto wallet interfaces such as SushiSwap, PancakeSwap, Hyperliquid, and Raydium.

    crypto phishing SushiSwap wallet
    Malicious application impersonating SushiSwap wallet (Source: Cyble)

    These applications often featured polished user interfaces that closely resembled the real platforms. Once users launched the fake apps, they were prompted to enter their 12-word mnemonic phrase, a critical piece of information used to access genuine crypto wallets. 

    These malicious apps were not distributed via obscure channels. Instead, they were made available directly through the Play Store, lending them an appearance of legitimacy.

    crypto phishing on Google Play Store
    Developer account previously hosting gaming apps and now distributing a malicious phishing app (Source: Cyble)

    CRIL found that the threat actors exploited compromised or repurposed developer accounts, some of which had previously published legitimate apps with over 100,000 downloads. 

    Phishing Techniques and Distribution Tactics 

    One common thread among these phishing apps was the embedding of malicious URLs within their privacy policies. Many used similar package names and descriptions, indicating a coordinated effort by a single or related group of attackers. These tactics helped disguise the true intent of the apps and evade automated detection systems.

    The apps were created using frameworks like Median, which allows for the quick transformation of websites into Android applications. In many cases, phishing websites were loaded into the apps via WebView components. For instance, one of the URLs used was hxxps://pancakefentfloyd.cz/api.php, which mimicked PancakeSwap and prompted users to input their mnemonic phrases. 

    crypto phishing
    IP hosting multiple phishing domains (Source: Cyble)

    Further technical analysis revealed that the IP address hosting one of the phishing domains (94.156.177.209) was linked to over 50 other phishing domains, showing just how vast and organized this campaign is. 

    List of Identified Malicious Apps

    CRIL’s detailed breakdown included dozens of malicious applications, including: 

    • Pancake Swap (co.median.android.pkmxaj) 
    • Suiet Wallet (co.median.android.ljqjry) 
    • Hyperliquid (co.median.android.jroylx) 
    • Raydium (co.median.android.yakmje) 
    • BullX Crypto (co.median.android.ozjwka) 
    • OpenOcean Exchange (co.median.android.ozjjkx) 
    • Meteora Exchange (co.median.android.kbxqaj) 
    • SushiSwap (co.median.android.pkezyz) 

    In addition, two apps used different naming conventions but shared the same malicious intent: Raydium (cryptoknowledge.rays) and PancakeSwap (com.cryptoknowledge.quizzz), both linking to the same phishing privacy policy hosted via TermsFeed. 

    A Coordinated Crypto Phishing Operation 

    This is not just a scattered attempt by low-level scammers. The infrastructure behind these apps, with more than 50 associated phishing domains, indicates a well-orchestrated phishing operation targeting the growing base of cryptocurrency users. By impersonating legitimate apps on a trusted platform like the Play Store, these attackers were able to breach users’ trust and evade conventional security measures. 

    If a user falls for this type of crypto phishing attack and submits their mnemonic phrase, attackers can immediately gain access to their crypto wallet and transfer funds, often irreversibly. Unlike traditional bank transactions, crypto transfers typically offer no recourse for recovery once completed. 

    Conclusion  

    To stay protected against these types of crypto phishing attacks, users are strongly advised to follow essential security practices: download apps only from verified developers, avoid any that request sensitive details such as mnemonic phrases, and carefully review app ratings and authenticity, especially for recently released apps. Enabling Google Play Protect, using trusted antivirus software, activating multi-factor authentication, and utilizing biometric security features where possible can provide additional layers of defense. Users should also avoid clicking on suspicious links received via SMS or email. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThink Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise
    Next Article OpenAI Bans ChatGPT Accounts Used by Russian, Iranian, and Chinese Hacker Groups

    Related Posts

    Development

    NativePHP Is Entering Its Next Phase

    July 26, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    I tested Samsung’s QD-OLED 4K monitor for gaming and work – and it was equally practical

    News & Updates

    CVE-2025-27023 – “Infinera G42 WebGUI CLI File Disclosure Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Kioxia Exceria Plus G2 Portable SSD 2TB Review

    Linux

    CVE-2025-52923 – Sangfor aTrust Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2022-47914 – Cisco WebEx Remote Code Execution

    May 28, 2025

    CVE ID : CVE-2022-47914

    Published : May 28, 2025, 7:15 p.m. | 2 hours, 13 minutes ago

    Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Google Expands On-Device AI to Counter Evolving Online Scams

    May 9, 2025

    CVE-2025-6002 – VirtueMart Unrestricted File Upload Vulnerability

    June 11, 2025

    CheepCode Engineers are bored watching their IDE write code. The next step is headless: writing tasks for the AI, and reviewing its work. That’s how CheepCode works.

    May 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.