Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. FakeWallet cryptostealer propagating via iOS App Store applications

FakeWallet cryptostealer propagating via iOS App Store applications

Scheduled Pinned Locked Moved Uncategorized
malwaredatabreachphishing
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • hackerworkspace@infosec.exchangeH This user is from outside of this forum
    hackerworkspace@infosec.exchangeH This user is from outside of this forum
    hackerworkspace@infosec.exchange
    wrote last edited by
    #1

    FakeWallet cryptostealer propagating via iOS App Store applications

    Link Preview Image
    FakeWallet cryptostealer propagating via iOS App Store applications

    In March 2026, we uncovered more than twenty phishing apps in the Apple App Store masquerading as popular crypto wallets.

    favicon

    Securelist (securelist.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/fakewallet-cryptostealer-propagating-via-ios-app-store-applications

    #malware #databreach #phishing

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups