Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Picha iliyoundwa na AI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Picha iliyoundwa na AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Linux Snap Store targeted in sophisticated crypto theft scheme

Cyber attackers have exploited the Snap Store, Canonical's repository for Linux software packages, to distribute malware disguised as legitimate cryptocurrency wallets. By registering expired domains previously linked to genuine publishers, hackers gain access to dormant Snapcraft accounts and upload malicious updates that harvest users' wallet recovery phrases.

Alan Pope, a former Canonical developer and Ubuntu contributor, first warned about this tactic on January 21, 2026. He detailed how attackers took over domains like storewise.tech and vagueentertainment.com, using associated email servers to reset credentials. "The malicious snaps looked normal but were designed to harvest [crypto wallet] recovery phrases and send them to servers controlled by the attackers," Pope explained. By the time users notice issues, their funds are often drained.

Blockchain security firm SlowMist echoed these concerns in a post on X by chief information security officer 23pds. The firm noted that compromised apps mimic interfaces of popular wallets such as Exodus, Ledger Live, and Trust Wallet, prompting users to enter sensitive seed phrases during installation or updates. "Attackers are abusing expired domains to hijack long-standing Snap Store publisher accounts and distribute malicious updates through official channels," 23pds stated.

This method builds on prior Snap Store abuses, including fake accounts and bait-and-switch tactics with innocuous app names like lemon-throw. SlowMist highlighted the supply-chain nature of the attack, aligning with 2025 trends where crypto hacks caused $3.3 billion in losses, per CertiK data, with supply-chain incidents accounting for $1.45 billion.

Canonical promptly removed the malicious snaps after reports from Pope and others. However, Pope criticized delays in takedowns, which can take days, and urged better verification: monitoring domain expirations, mandatory two-factor authentication, and checks for dormant accounts. He also launched SnapScope, a web tool to scan snaps for vulnerabilities.

Users are advised to download crypto wallets directly from official sites and enable 2FA on accounts. Publishers should renew domains promptly. Help Net Security contacted Canonical for planned enhancements, with updates pending.

This incident underscores growing threats to software distribution channels, eroding trust in app stores as attackers favor high-impact exploits over direct code vulnerabilities.

Watu wanasema nini

X discussions warn Linux users about a supply-chain attack on Snap Store where attackers hijacked publisher accounts via expired domains to distribute fake crypto wallet updates stealing seed phrases. Security experts like SlowMist highlight risks to long-time users of apps like Exodus and Ledger Live. Reactions urge verifying snaps, moving funds, and stronger safeguards from Canonical. Some express frustration with Linux security practices.

Makala yanayohusiana

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Picha iliyoundwa na AI

Malicious npm packages steal developer credentials on multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

Imeripotiwa na AI

Threat actors are mailing physical letters impersonating Trezor and Ledger to trick cryptocurrency hardware wallet users into revealing recovery phrases. The letters create urgency by claiming mandatory checks are required to avoid losing wallet access. Victims scanning included QR codes are directed to phishing sites that steal their wallet information.

The cryptocurrency industry experienced a significant reduction in hack-related losses last December, totaling $76 million, according to blockchain security firm PeckShield. This marks a 60% decrease from November's $194.2 million in damages. Despite the improvement, 26 major exploits still occurred, highlighting ongoing vulnerabilities.

Imeripotiwa na AI

Major VPN providers such as NordVPN, ExpressVPN, and Proton VPN are facing attacks through typosquatting, where fake domains mimic their official sites. A report indicates that 14 percent of these imitation domains are malicious. Users are advised to take precautions to avoid falling victim to these scams.

Threat actors are using comments on Pastebin to promote a scam that tricks cryptocurrency users into running malicious JavaScript on Swapzone.io, hijacking Bitcoin transactions. The attack, a variant of ClickFix techniques, redirects funds to attacker-controlled wallets while mimicking legitimate arbitrage profits. This appears to be the first known instance of such a browser-based ClickFix targeting crypto exchanges.

Imeripotiwa na AI

Following the 2022 LastPass data breach, blockchain firm TRM Labs has tied over $35 million in stolen cryptocurrency to Russian cybercriminals, detailing sophisticated laundering via mixers and exchanges persisting into late 2025.

Jumatatu, 9. Mwezi wa tatu 2026, 15:31:11

Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Jumanne, 17. Mwezi wa pili 2026, 02:30:36

Research uncovers flaws in password managers' zero-knowledge claims

Jumatano, 11. Mwezi wa pili 2026, 00:43:36

Researchers discover SSHStalker botnet infecting Linux servers

Jumapili, 8. Mwezi wa pili 2026, 16:39:00

Two teens arrested in alleged $66 million crypto theft attempt

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Ijumaa, 23. Mwezi wa kwanza 2026, 10:04:03

Hackers extort French crypto firm Waltio after stealing user data

Jumapili, 4. Mwezi wa kwanza 2026, 12:16:04

Wrench attacks on crypto holders rise in frequency and violence

Alhamisi, 1. Mwezi wa kwanza 2026, 11:23:01

Trust Wallet confirms second Shai-Hulud supply-chain attack

Alhamisi, 25. Mwezi wa kumi na mbili 2025, 10:53:34

LastPass 2022 breach enables years of cryptocurrency thefts

Jumatano, 10. Mwezi wa kumi na mbili 2025, 08:16:59

Crypto's new rich seek privacy amid extortion threats

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa