Apple’s App Store has removed a malicious Trezor wallet app after Crypto Lawyers Managing Partner Rafael Yakobi raised concerns about its potential to steal cryptocurrency. However, a quick search shows that other potentially harmful copycat apps still exist on the platform, raising questions about Apple’s vetting process.
Yakobi reported that the fake “Trezor Wallet Suite” app requested users’ seed phrases, which would enable the app’s operators to steal their crypto. Unfortunately, it is unknown how many people have fallen victim to this malware, but the number could be in the hundreds or thousands.
While Apple is generally swift to remove fraudulent apps once notified, it seems that the Trezor malware issue is far from being resolved. A search for “Trezor Wallet Suite” returns another dubious application called “MyTREZŌR Suite: One Edition,” which has only two reviews – both warning that the app is a scam.
Apple insists that apps on its official store have been vetted and cleared for security purposes, yet it appears that the company has not fully eradicated all fake apps posing as legitimate crypto wallets. The safest way for users to download mobile applications for crypto wallets is from the manufacturers’ official websites.
The world’s largest tech company has a reputation for being hesitant when it comes to approving cryptocurrency-related apps, only giving the green light under strict circumstances. Still, as this case demonstrates, even the most stringent measures can fail to keep scam apps at bay.
Fake wallet apps are no strangers to Apple’s App Store. In 2021, a user reportedly lost $600,000 in Bitcoin after downloading a malicious Trezor app from the platform. With fake apps continuing to find their way onto the store, users must remain vigilant and verify the legitimacy of the apps they download.
Ultimately, Apple’s inability to completely eliminate fraudulent apps from their store may dampen trust in the company’s vetting process and its commitment to user security. Crypto users must remain cautious and rely on official sources, such as manufacturers’ websites, to minimize their exposure to malicious software.
Source: Cointelegraph