Skip to main content

Crypto Phishing Applications On The Play Store

Medium
Published: Fri Jun 20 2025 (06/20/2025, 19:25:58 UTC)
Source: AlienVault OTX General

Description

An investigation uncovered more than 20 cryptocurrency phishing applications on the Google Play Store impersonating legitimate wallets like SushiSwap and PancakeSwap. These malicious apps employ phishing techniques to steal users' mnemonic phrases, allowing access to real wallets and theft of funds. The apps share common patterns, including embedded C&C URLs in privacy policies and similar package names. They are distributed through compromised developer accounts previously used for legitimate apps. Two main types were identified: those using the Median framework and those directly loading phishing URLs into WebViews. The campaign demonstrates a coordinated operation with a large-scale phishing infrastructure linked to over 50 domains.

AI-Powered Analysis

AILast updated: 06/21/2025, 13:07:33 UTC

Technical Analysis

This threat involves a coordinated campaign distributing over 20 malicious cryptocurrency phishing applications on the Google Play Store. These apps impersonate legitimate decentralized finance (DeFi) wallet applications such as SushiSwap and PancakeSwap, which are popular platforms for cryptocurrency trading and liquidity provision. The malicious applications employ phishing techniques aimed at stealing users' mnemonic seed phrases — critical credentials that provide full access to cryptocurrency wallets. By capturing these phrases, attackers can gain unauthorized access to victims' wallets and steal their funds. The campaign is notable for its use of compromised developer accounts that were previously used to publish legitimate apps, allowing the malicious apps to bypass some of Google's app vetting processes. Two primary technical approaches were identified: one group of apps uses the Median framework, a known tool for building phishing apps, while the other group loads phishing URLs directly into embedded WebViews within the app, effectively presenting fake login or seed phrase input pages to users. The apps share common characteristics such as similar package names and embedded command and control (C&C) URLs hidden within privacy policy documents, indicating a well-organized infrastructure. The campaign is linked to a large-scale phishing infrastructure involving over 50 domains, suggesting a broad and persistent operation. Although no known exploits in the wild have been reported beyond this campaign, the threat poses a significant risk to cryptocurrency users relying on Android devices and the Google Play ecosystem. The attack leverages social engineering and app impersonation rather than exploiting software vulnerabilities, making it harder to detect by traditional antivirus or signature-based defenses.

Potential Impact

For European organizations, particularly those involved in cryptocurrency trading, fintech, or blockchain services, this campaign represents a direct financial threat to employees and customers using Android devices. The theft of mnemonic phrases can lead to irreversible loss of cryptocurrency assets, impacting both personal and corporate wallets. Organizations that provide crypto-related services or custody solutions may face reputational damage if their users fall victim to these phishing apps. Additionally, the presence of such apps on the official Google Play Store undermines user trust in app distribution platforms, potentially affecting adoption rates of legitimate crypto applications in Europe. The campaign could also indirectly impact European financial institutions that have exposure to cryptocurrency markets through investment or client holdings. Given the decentralized and irreversible nature of cryptocurrency transactions, stolen funds are unlikely to be recovered, amplifying the financial impact. Furthermore, the use of compromised developer accounts indicates a potential supply chain risk, where legitimate app developers could be targeted and their accounts hijacked, increasing the attack surface for European users. The threat also highlights the challenge of detecting phishing attacks embedded within mobile apps, which may bypass traditional email or web-based phishing defenses commonly deployed in European enterprises.

Mitigation Recommendations

European organizations and users should implement several targeted mitigations beyond generic advice: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to verified developers and use app reputation services to detect suspicious apps, especially those mimicking crypto wallets. 2) Educate employees and customers about the risks of entering mnemonic phrases into any app or webpage, emphasizing that legitimate wallets never request seed phrases outside of secure wallet setup or recovery processes. 3) Monitor and audit developer accounts associated with corporate or partner apps to detect unauthorized access or suspicious publishing activity, and promptly revoke compromised credentials. 4) Collaborate with Google and security researchers to report and expedite removal of phishing apps, and encourage the use of Google Play Protect and other app scanning tools. 5) Deploy endpoint protection solutions capable of analyzing app behavior, including WebView content, to detect embedded phishing URLs or suspicious network communications. 6) Encourage the use of hardware wallets or multi-factor authentication mechanisms for accessing cryptocurrency assets to reduce reliance on mnemonic phrases alone. 7) For organizations offering crypto services, implement transaction monitoring and anomaly detection to identify potentially fraudulent transfers resulting from compromised credentials. 8) Maintain updated threat intelligence feeds to track emerging phishing domains and infrastructure linked to this campaign and block them at network perimeters.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cyble.com/blog/crypto-phishing-applications-on-the-play-store"]
Adversary
null
Pulse Id
6855b5c6ea3a7d971baf5551
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashb2e6fd5f9662c4215f89240c8c960977
hashb703efe31690b6f84676e795d33f6283
hash265970e7f8f5c9618ffc215c7612eff4fe97f20a
hashf288c626be0ba452e098d11b207867793522373c
hash4aa3659c50616d21ef0bda1389cba1ad3fe768b9dd25eee09289ece97cd3623f
hash4b35a1ed93ab68f0401de34d4eb5dbb582465ee2a8428e16d0beac8bf87a09af

Ip

ValueDescriptionCopy
ip94.156.177.209

Domain

ValueDescriptionCopy
domainaerodromeaz.sbs
domainaerodromesblogs.site
domainbitunixflo.sbs
domainbravebn.sbs
domainbubblemapsblogs.sbs
domainbullxni.sbs
domaincetusdi.sbs
domaincryptoknowledge.click
domainharvestfin.sbs
domainhyperliqw.sbs
domainjumperblogs.site
domainmeteorablog.site
domainmeteorafloydoverdose.sbs
domainmeteorasp.ru
domainopenoceansi.sbs
domainpancakefentfloyd.cz
domainpancakws.ru
domainpiwalletblog.blog
domainpumpjake.sbs
domainraydi-commerce.cz
domainraydifloyd.cz
domainraydiumblogs.site
domainraydiumsm.sbs
domainsolscanpv.ru
domainstaratlas.sbs
domainsuietsiz.cz
domainsuietwallets.site
domainsuietwz.sbs
domainsuiscanfl.sbs
domainsuivisionsl.sbs
domainsushiblogsite.site
domainsushijames.sbs
domainwalrusod.sbs

Threat ID: 68568e6baded773421b59aae

Added to database: 6/21/2025, 10:50:19 AM

Last enriched: 6/21/2025, 1:07:33 PM

Last updated: 8/16/2025, 5:57:56 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats