Crypto Phishing Applications On The Play Store
An investigation uncovered more than 20 cryptocurrency phishing applications on the Google Play Store impersonating legitimate wallets like SushiSwap and PancakeSwap. These malicious apps employ phishing techniques to steal users' mnemonic phrases, allowing access to real wallets and theft of funds. The apps share common patterns, including embedded C&C URLs in privacy policies and similar package names. They are distributed through compromised developer accounts previously used for legitimate apps. Two main types were identified: those using the Median framework and those directly loading phishing URLs into WebViews. The campaign demonstrates a coordinated operation with a large-scale phishing infrastructure linked to over 50 domains.
AI Analysis
Technical Summary
This threat involves a coordinated campaign distributing over 20 malicious cryptocurrency phishing applications on the Google Play Store. These apps impersonate legitimate decentralized finance (DeFi) wallet applications such as SushiSwap and PancakeSwap, which are popular platforms for cryptocurrency trading and liquidity provision. The malicious applications employ phishing techniques aimed at stealing users' mnemonic seed phrases — critical credentials that provide full access to cryptocurrency wallets. By capturing these phrases, attackers can gain unauthorized access to victims' wallets and steal their funds. The campaign is notable for its use of compromised developer accounts that were previously used to publish legitimate apps, allowing the malicious apps to bypass some of Google's app vetting processes. Two primary technical approaches were identified: one group of apps uses the Median framework, a known tool for building phishing apps, while the other group loads phishing URLs directly into embedded WebViews within the app, effectively presenting fake login or seed phrase input pages to users. The apps share common characteristics such as similar package names and embedded command and control (C&C) URLs hidden within privacy policy documents, indicating a well-organized infrastructure. The campaign is linked to a large-scale phishing infrastructure involving over 50 domains, suggesting a broad and persistent operation. Although no known exploits in the wild have been reported beyond this campaign, the threat poses a significant risk to cryptocurrency users relying on Android devices and the Google Play ecosystem. The attack leverages social engineering and app impersonation rather than exploiting software vulnerabilities, making it harder to detect by traditional antivirus or signature-based defenses.
Potential Impact
For European organizations, particularly those involved in cryptocurrency trading, fintech, or blockchain services, this campaign represents a direct financial threat to employees and customers using Android devices. The theft of mnemonic phrases can lead to irreversible loss of cryptocurrency assets, impacting both personal and corporate wallets. Organizations that provide crypto-related services or custody solutions may face reputational damage if their users fall victim to these phishing apps. Additionally, the presence of such apps on the official Google Play Store undermines user trust in app distribution platforms, potentially affecting adoption rates of legitimate crypto applications in Europe. The campaign could also indirectly impact European financial institutions that have exposure to cryptocurrency markets through investment or client holdings. Given the decentralized and irreversible nature of cryptocurrency transactions, stolen funds are unlikely to be recovered, amplifying the financial impact. Furthermore, the use of compromised developer accounts indicates a potential supply chain risk, where legitimate app developers could be targeted and their accounts hijacked, increasing the attack surface for European users. The threat also highlights the challenge of detecting phishing attacks embedded within mobile apps, which may bypass traditional email or web-based phishing defenses commonly deployed in European enterprises.
Mitigation Recommendations
European organizations and users should implement several targeted mitigations beyond generic advice: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to verified developers and use app reputation services to detect suspicious apps, especially those mimicking crypto wallets. 2) Educate employees and customers about the risks of entering mnemonic phrases into any app or webpage, emphasizing that legitimate wallets never request seed phrases outside of secure wallet setup or recovery processes. 3) Monitor and audit developer accounts associated with corporate or partner apps to detect unauthorized access or suspicious publishing activity, and promptly revoke compromised credentials. 4) Collaborate with Google and security researchers to report and expedite removal of phishing apps, and encourage the use of Google Play Protect and other app scanning tools. 5) Deploy endpoint protection solutions capable of analyzing app behavior, including WebView content, to detect embedded phishing URLs or suspicious network communications. 6) Encourage the use of hardware wallets or multi-factor authentication mechanisms for accessing cryptocurrency assets to reduce reliance on mnemonic phrases alone. 7) For organizations offering crypto services, implement transaction monitoring and anomaly detection to identify potentially fraudulent transfers resulting from compromised credentials. 8) Maintain updated threat intelligence feeds to track emerging phishing domains and infrastructure linked to this campaign and block them at network perimeters.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Spain, Italy
Indicators of Compromise
- hash: b2e6fd5f9662c4215f89240c8c960977
- hash: b703efe31690b6f84676e795d33f6283
- hash: 265970e7f8f5c9618ffc215c7612eff4fe97f20a
- hash: f288c626be0ba452e098d11b207867793522373c
- hash: 4aa3659c50616d21ef0bda1389cba1ad3fe768b9dd25eee09289ece97cd3623f
- hash: 4b35a1ed93ab68f0401de34d4eb5dbb582465ee2a8428e16d0beac8bf87a09af
- ip: 94.156.177.209
- domain: aerodromeaz.sbs
- domain: aerodromesblogs.site
- domain: bitunixflo.sbs
- domain: bravebn.sbs
- domain: bubblemapsblogs.sbs
- domain: bullxni.sbs
- domain: cetusdi.sbs
- domain: cryptoknowledge.click
- domain: harvestfin.sbs
- domain: hyperliqw.sbs
- domain: jumperblogs.site
- domain: meteorablog.site
- domain: meteorafloydoverdose.sbs
- domain: meteorasp.ru
- domain: openoceansi.sbs
- domain: pancakefentfloyd.cz
- domain: pancakws.ru
- domain: piwalletblog.blog
- domain: pumpjake.sbs
- domain: raydi-commerce.cz
- domain: raydifloyd.cz
- domain: raydiumblogs.site
- domain: raydiumsm.sbs
- domain: solscanpv.ru
- domain: staratlas.sbs
- domain: suietsiz.cz
- domain: suietwallets.site
- domain: suietwz.sbs
- domain: suiscanfl.sbs
- domain: suivisionsl.sbs
- domain: sushiblogsite.site
- domain: sushijames.sbs
- domain: walrusod.sbs
Crypto Phishing Applications On The Play Store
Description
An investigation uncovered more than 20 cryptocurrency phishing applications on the Google Play Store impersonating legitimate wallets like SushiSwap and PancakeSwap. These malicious apps employ phishing techniques to steal users' mnemonic phrases, allowing access to real wallets and theft of funds. The apps share common patterns, including embedded C&C URLs in privacy policies and similar package names. They are distributed through compromised developer accounts previously used for legitimate apps. Two main types were identified: those using the Median framework and those directly loading phishing URLs into WebViews. The campaign demonstrates a coordinated operation with a large-scale phishing infrastructure linked to over 50 domains.
AI-Powered Analysis
Technical Analysis
This threat involves a coordinated campaign distributing over 20 malicious cryptocurrency phishing applications on the Google Play Store. These apps impersonate legitimate decentralized finance (DeFi) wallet applications such as SushiSwap and PancakeSwap, which are popular platforms for cryptocurrency trading and liquidity provision. The malicious applications employ phishing techniques aimed at stealing users' mnemonic seed phrases — critical credentials that provide full access to cryptocurrency wallets. By capturing these phrases, attackers can gain unauthorized access to victims' wallets and steal their funds. The campaign is notable for its use of compromised developer accounts that were previously used to publish legitimate apps, allowing the malicious apps to bypass some of Google's app vetting processes. Two primary technical approaches were identified: one group of apps uses the Median framework, a known tool for building phishing apps, while the other group loads phishing URLs directly into embedded WebViews within the app, effectively presenting fake login or seed phrase input pages to users. The apps share common characteristics such as similar package names and embedded command and control (C&C) URLs hidden within privacy policy documents, indicating a well-organized infrastructure. The campaign is linked to a large-scale phishing infrastructure involving over 50 domains, suggesting a broad and persistent operation. Although no known exploits in the wild have been reported beyond this campaign, the threat poses a significant risk to cryptocurrency users relying on Android devices and the Google Play ecosystem. The attack leverages social engineering and app impersonation rather than exploiting software vulnerabilities, making it harder to detect by traditional antivirus or signature-based defenses.
Potential Impact
For European organizations, particularly those involved in cryptocurrency trading, fintech, or blockchain services, this campaign represents a direct financial threat to employees and customers using Android devices. The theft of mnemonic phrases can lead to irreversible loss of cryptocurrency assets, impacting both personal and corporate wallets. Organizations that provide crypto-related services or custody solutions may face reputational damage if their users fall victim to these phishing apps. Additionally, the presence of such apps on the official Google Play Store undermines user trust in app distribution platforms, potentially affecting adoption rates of legitimate crypto applications in Europe. The campaign could also indirectly impact European financial institutions that have exposure to cryptocurrency markets through investment or client holdings. Given the decentralized and irreversible nature of cryptocurrency transactions, stolen funds are unlikely to be recovered, amplifying the financial impact. Furthermore, the use of compromised developer accounts indicates a potential supply chain risk, where legitimate app developers could be targeted and their accounts hijacked, increasing the attack surface for European users. The threat also highlights the challenge of detecting phishing attacks embedded within mobile apps, which may bypass traditional email or web-based phishing defenses commonly deployed in European enterprises.
Mitigation Recommendations
European organizations and users should implement several targeted mitigations beyond generic advice: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to verified developers and use app reputation services to detect suspicious apps, especially those mimicking crypto wallets. 2) Educate employees and customers about the risks of entering mnemonic phrases into any app or webpage, emphasizing that legitimate wallets never request seed phrases outside of secure wallet setup or recovery processes. 3) Monitor and audit developer accounts associated with corporate or partner apps to detect unauthorized access or suspicious publishing activity, and promptly revoke compromised credentials. 4) Collaborate with Google and security researchers to report and expedite removal of phishing apps, and encourage the use of Google Play Protect and other app scanning tools. 5) Deploy endpoint protection solutions capable of analyzing app behavior, including WebView content, to detect embedded phishing URLs or suspicious network communications. 6) Encourage the use of hardware wallets or multi-factor authentication mechanisms for accessing cryptocurrency assets to reduce reliance on mnemonic phrases alone. 7) For organizations offering crypto services, implement transaction monitoring and anomaly detection to identify potentially fraudulent transfers resulting from compromised credentials. 8) Maintain updated threat intelligence feeds to track emerging phishing domains and infrastructure linked to this campaign and block them at network perimeters.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cyble.com/blog/crypto-phishing-applications-on-the-play-store"]
- Adversary
- null
- Pulse Id
- 6855b5c6ea3a7d971baf5551
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hashb2e6fd5f9662c4215f89240c8c960977 | — | |
hashb703efe31690b6f84676e795d33f6283 | — | |
hash265970e7f8f5c9618ffc215c7612eff4fe97f20a | — | |
hashf288c626be0ba452e098d11b207867793522373c | — | |
hash4aa3659c50616d21ef0bda1389cba1ad3fe768b9dd25eee09289ece97cd3623f | — | |
hash4b35a1ed93ab68f0401de34d4eb5dbb582465ee2a8428e16d0beac8bf87a09af | — |
Ip
Value | Description | Copy |
---|---|---|
ip94.156.177.209 | — |
Domain
Value | Description | Copy |
---|---|---|
domainaerodromeaz.sbs | — | |
domainaerodromesblogs.site | — | |
domainbitunixflo.sbs | — | |
domainbravebn.sbs | — | |
domainbubblemapsblogs.sbs | — | |
domainbullxni.sbs | — | |
domaincetusdi.sbs | — | |
domaincryptoknowledge.click | — | |
domainharvestfin.sbs | — | |
domainhyperliqw.sbs | — | |
domainjumperblogs.site | — | |
domainmeteorablog.site | — | |
domainmeteorafloydoverdose.sbs | — | |
domainmeteorasp.ru | — | |
domainopenoceansi.sbs | — | |
domainpancakefentfloyd.cz | — | |
domainpancakws.ru | — | |
domainpiwalletblog.blog | — | |
domainpumpjake.sbs | — | |
domainraydi-commerce.cz | — | |
domainraydifloyd.cz | — | |
domainraydiumblogs.site | — | |
domainraydiumsm.sbs | — | |
domainsolscanpv.ru | — | |
domainstaratlas.sbs | — | |
domainsuietsiz.cz | — | |
domainsuietwallets.site | — | |
domainsuietwz.sbs | — | |
domainsuiscanfl.sbs | — | |
domainsuivisionsl.sbs | — | |
domainsushiblogsite.site | — | |
domainsushijames.sbs | — | |
domainwalrusod.sbs | — |
Threat ID: 68568e6baded773421b59aae
Added to database: 6/21/2025, 10:50:19 AM
Last enriched: 6/21/2025, 1:07:33 PM
Last updated: 8/16/2025, 5:57:56 PM
Views: 24
Related Threats
Elastic EDR 0-day: Microsoft-signed driver can be weaponized to attack its own host
MediumEncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumThe Hidden Infrastructure Behind VexTrio's TDS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.