We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
No cookies to display.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
No cookies to display.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
No cookies to display.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
No cookies to display.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
No cookies to display.
Android users, delete this ‘dangerous’ crypto app from your phones – Times of India
A cybersecurity firm has identified a malicious application lurking within the Google Play Store, specifically engineered to pilfer cryptocurrency from unsuspecting users. This nefarious app, which managed to elude detection for over five months, was first introduced to the marketplace in March 2024.
According to a report from Check Point Research, the app, dubbed WalletConnect – Airdrop Wallet, exclusively targeted Android mobile device users. It employed sophisticated evasion techniques, masquerading as a legitimate tool for Web3 applications to escape scrutiny.
How this app avoided detection
The creators of this fraudulent application cleverly leveraged the credibility of the WalletConnect protocol, a widely used service that links cryptocurrency wallets to decentralized applications. Over the course of five months, hackers successfully siphoned approximately ,000 (around 58.6 lakh) in cryptocurrency from their victims, as detailed in the report.
In addition to utilizing fake positive reviews, the app’s developers harnessed advanced crypto drainer toolkits to manipulate search rankings, resulting in over 10,000 downloads. This strategic maneuvering allowed the app to blend into the vast array of legitimate offerings on the platform.
What techniques hackers deployed to steal data
Connecting with WalletConnect can often present challenges for users. Not all wallets support the protocol, and many users may not have the latest version installed. Hackers capitalized on these complexities, enticing users with the false promise of an easy solution through their counterfeit app.
Upon downloading and launching the malicious WalletConnect application, users were prompted to connect their cryptocurrency wallets. The hackers then directed victims to phishing websites and applications that closely resembled legitimate cryptocurrency platforms, misleading users into authorizing unauthorized transactions. This allowed the drainer app to execute transfers of digital assets directly into the hands of the criminals.
Despite the theft, around 20 users took to Google Play to voice their dissatisfaction, leaving negative reviews. However, the developers of the malware swiftly countered this backlash by inundating the review section with fake positive feedback, effectively obscuring the negative comments and creating an illusion of legitimacy to ensnare further victims.