Fake Ledger App on Apple App Store Drains 5.9 BTC in Wallet Security Alert


A fake Ledger Live app listed in Apple’s Mac App Store drained 5.92 bitcoins — worth roughly $420,000 — from musician Garrett Dutton, known professionally as G. Love, after the victim entered his 24-word seed phrase into the scam app while setting up his wallet on a new Apple computer.

Dutton revealed the theft on April 11, 2026, via X, describing the loss as his entire Bitcoin retirement savings, accumulated over nearly a decade. On-chain investigator ZachXBT later confirmed the money laundering trail, tracing the stolen funds across nine transactions to deposit addresses at KuCoin.


We believe this incident is less a story of one user’s bad luck than a structural signal about the continuing failure of major app distribution platforms to screen fraudulent cryptocurrency wallet apps before they reach end users.

discovers: Best cryptocurrencies to buy now

Fake Ledger app store listing, seed phrase capture, and on-chain path to KuCoin

The mechanism works as follows: The fraudulent app was listed in Apple’s Mac App Store under a non-Ledger developer account, yet presented itself visually and functionally as the legitimate Ledger Live desktop client, the companion software that Ledger hardware wallet users install to manage their devices and assets.

When Dutton downloaded and ran the app while migrating the device to a new Apple computer, the app immediately prompted him to enter the 24-word recovery phrase — a prompt the original Ledger Live software doesn’t make during a normal desktop setup, where the initial phrase is entered exclusively on the physical device.

Dutton complied, entering the phrase into the fake app, which sent the credentials to the attackers. The mechanism by which BTC was mined required no additional interaction from the victim: possession of the seed phrase granted complete and irrevocable control over all associated wallet funds, independent of the device itself.

ZachXBT’s tracking identified nine external transactions distributing 5.92 BTC to KuCoin deposit addresses, a laundering pattern consistent with previous fake wallet campaigns where exchanges with less stringent deposit screening were used to quickly transfer stolen property.

At the time of the theft, the approximate dollar value was $420,000 based on a Bitcoin price near $70,955. KuCoin has not issued a public statement regarding the tracked deposits as of press time. Dutton publicly explained that the attack was the result of social engineering through a rogue app, rather than a flaw in the Ledger device itself — an important distinction in how users engineer the threat.

App Store Review Failures and Repeated Wallet Fraud Attack Surface

This isn’t the first time a fake Ledger app has cleared the App Store’s ostensibly moderated review process. In 2023, a fake Ledger Live app listed on the Microsoft App Store enabled attackers to steal approximately $600,000 in bitcoin from multiple victims before the listing was taken down.

In early 2025, cybersecurity firm Moonlock documented macOS malware that silently replaced legitimate Ledger Live installations on users’ devices and prompted seed phrase injection through a spoofed interface. The recurring pattern – fake app, app store or file system delivery, initial phrase capture, instant cash out – has persisted across platforms and years without a structural solution.

Ledger has maintained a consistent public position that its software is distributed exclusively through ledger.com, and that no legitimate Ledger application will request a recovery phrase on the desktop or mobile interface.

Despite this, rogue apps continue to appear in App Store search results under non-Ledger developer accounts, exploiting users’ trust that extends to Apple’s review infrastructure. We suspect that Apple’s app review process—designed primarily to assess functional integrity and policy compliance—is structurally ill-equipped to detect semantic spoofing of hardware wallet interfaces, where the deception lies not in the execution of malicious code but in a fraudulent UI requesting sensitive credentials.

The broader context for self-custodians is just that Sophisticated theft targeting cryptocurrency holders They increasingly combine social engineering with a distribution infrastructure that carries implicit legitimacy — an app store listing, a realistic interface, and a reasonable setup flow. The attack surface does not narrow.

explores: Best meme coins to watch – updated CoinSpeaker rankings

Disclaimer: Coinspeaker is committed to providing unbiased and transparent reporting. This article aims to provide accurate and timely information but should not be considered financial or investment advice. Since market conditions can change rapidly, we encourage you to verify the information yourself and consult with a professional before making any decisions based on this content.

Web News 3, Cyber ​​security news

Daniel Francis

Daniel Francis is a technical writer and Web3 educator specializing in macroeconomics and DeFi mechanics. A crypto native since 2017, Daniel brings his background in cross-chain analytics to author evidence-based reports and detailed guides. It is certified by the Blockchain Council and is dedicated to providing “information gain” that cuts through the market noise to find blockchain’s real-world utility.






Source link

Leave a Reply

Your email address will not be published. Required fields are marked *