Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Larawang ginawa ng AI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Larawang ginawa ng AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Linux Snap Store targeted in sophisticated crypto theft scheme

Cyber attackers have exploited the Snap Store, Canonical's repository for Linux software packages, to distribute malware disguised as legitimate cryptocurrency wallets. By registering expired domains previously linked to genuine publishers, hackers gain access to dormant Snapcraft accounts and upload malicious updates that harvest users' wallet recovery phrases.

Alan Pope, a former Canonical developer and Ubuntu contributor, first warned about this tactic on January 21, 2026. He detailed how attackers took over domains like storewise.tech and vagueentertainment.com, using associated email servers to reset credentials. "The malicious snaps looked normal but were designed to harvest [crypto wallet] recovery phrases and send them to servers controlled by the attackers," Pope explained. By the time users notice issues, their funds are often drained.

Blockchain security firm SlowMist echoed these concerns in a post on X by chief information security officer 23pds. The firm noted that compromised apps mimic interfaces of popular wallets such as Exodus, Ledger Live, and Trust Wallet, prompting users to enter sensitive seed phrases during installation or updates. "Attackers are abusing expired domains to hijack long-standing Snap Store publisher accounts and distribute malicious updates through official channels," 23pds stated.

This method builds on prior Snap Store abuses, including fake accounts and bait-and-switch tactics with innocuous app names like lemon-throw. SlowMist highlighted the supply-chain nature of the attack, aligning with 2025 trends where crypto hacks caused $3.3 billion in losses, per CertiK data, with supply-chain incidents accounting for $1.45 billion.

Canonical promptly removed the malicious snaps after reports from Pope and others. However, Pope criticized delays in takedowns, which can take days, and urged better verification: monitoring domain expirations, mandatory two-factor authentication, and checks for dormant accounts. He also launched SnapScope, a web tool to scan snaps for vulnerabilities.

Users are advised to download crypto wallets directly from official sites and enable 2FA on accounts. Publishers should renew domains promptly. Help Net Security contacted Canonical for planned enhancements, with updates pending.

This incident underscores growing threats to software distribution channels, eroding trust in app stores as attackers favor high-impact exploits over direct code vulnerabilities.

Ano ang sinasabi ng mga tao

X discussions warn Linux users about a supply-chain attack on Snap Store where attackers hijacked publisher accounts via expired domains to distribute fake crypto wallet updates stealing seed phrases. Security experts like SlowMist highlight risks to long-time users of apps like Exodus and Ledger Live. Reactions urge verifying snaps, moving funds, and stronger safeguards from Canonical. Some express frustration with Linux security practices.

Mga Kaugnay na Artikulo

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Larawang ginawa ng AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Iniulat ng AI Larawang ginawa ng AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Threat actors are mailing physical letters impersonating Trezor and Ledger to trick cryptocurrency hardware wallet users into revealing recovery phrases. The letters create urgency by claiming mandatory checks are required to avoid losing wallet access. Victims scanning included QR codes are directed to phishing sites that steal their wallet information.

Iniulat ng AI

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

Criminals have distributed fake AI extensions in the Google Chrome Web Store to target more than 300,000 users. These tools aim to steal emails, personal data, and other information. The issue highlights ongoing efforts to push surveillance software through legitimate channels.

Iniulat ng AI

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan