Security & Infrastructure Tools
Fake Ledger Live App on Apple's App Store Drains $9.5M in Crypto
A fake Ledger Live Mac app on Apple’s App Store drained about $9.5 million in cryptocurrency from 50 victims in just a few days by harvesting seed phrases. Attackers moved funds across Bitcoin, Ethereum, Tron, Solana, and Ripple, then laundered them through roughly 150 KuCoin deposit addresses via the AudiA6 mixer. Three victims lost seven-figure amounts ($3.23M, $2.08M, and $1.95M); musician G. Love lost 5.9 BTC (about $430k). The counterfeit app appeared under the publisher “Leva Heal Limited” and was removed after user reports. Ledger’s legitimate Mac app is available only on its website, not in the App Store. KuCoin froze involved accounts until April 20, 2026, with possible extensions by law enforcement. This incident echoes past exploits that target app-store gaps, including a 2023 Microsoft Store case.

FAKE LEDGER LIVE APP ON APPLE’S APP STORE STOLE $9.5M IN CRYPTO
- OVERVIEW
- A deceptive Ledger Live application masquerading as legitimate macOS software was available in Apple’s App Store.
- In a span of days in April 2026, the fake app drained approximately $9.5 million in cryptocurrency from about 50 victims.
- Victims who installed and authenticated with the fake app were prompted to enter seed/recovery phrases, granting attackers full access to their wallets.
- The stolen funds were moved across multiple blockchain networks and subsequently laundered through a centralized mixing service and numerous deposit addresses.
- TIMELINE AND KEY DATES
- April 8–11, 2026: Analysts tracked three individual victims losing seven-figure sums — $3.23 million, $2.08 million, and $1.95 million — via the fake Ledger app.
- April 14, 2026: Apple removed the fraudulent app from the App Store after multiple user reports.
- In the days surrounding the events, the attackers received funds on chains including Bitcoin, Ethereum, Tron, Solana, and Ripple, before beginning the laundering process.
- HOW THE ATTACK OPERATED
- Initial vector: A tainted macOS application published in the Apple App Store, advertised as Ledger Live for Mac.
- Social engineering and user input: Victims were induced to enter their seed/recovery phrases directly into the fake app, providing attackers with immediate access to wallets.
- Cross-chain movement: Collected funds were funneled through several wallet addresses on multiple blockchains, expanding the attack surface and complicating traceability.
- Laundering route: A large portion of stolen funds entered KuCoin deposit addresses under the control of a centralized mixing service dubbed “AudiA6,” which charges high fees to obscure final destinations.
- VICTIMS AND AMOUNTS
- Number of victims: Approximately 50 individuals.
- Aggregate loss: Roughly $9.5 million in stolen assets.
- Notable individual losses: A musician known as G. Love reported loss of 5.9 BTC (about $430,000 at the relevant price point), verified by investigators.
- Individual seven-figure losses included three large sums: $3.23 million, $2.08 million, and $1.95 million, concentrated in the early part of the window.
- EVIDENCE, WALLET TRACKING, AND INVESTIGATIONS
- Investigator: ZachXBT monitored wallet activity and traced flows across multiple chains, identifying the path from compromised seed phrases to centralized laundering endpoints.
- Wallet activity: Several wallet addresses collected and consolidated funds before dispersing them to laundering routes and external addresses.
- Public traces: Blockchains and transaction histories linked the stolen funds to the AudiA6 mixer and KuCoin deposit addresses, forming a clear chain of custody for the fraud.
- PUBLISHER, APP STORE, AND AVAILABILITY GAP
- Publisher impersonation: The fraudulent app appeared under the publisher name “Leva Heal Limited,” a designation not associated with Ledger’s official development team.
- Version history spoof: The attackers fabricated a rapid version history, rolling from 1.0 to 5.0 within roughly two weeks, giving the illusion of ongoing legitimate updates.
- Platform mismatch: Ledger maintains a macOS app on its official site, but does not offer a Ledger macOS app in Apple’s App Store; the App Store version that appeared to be Ledger for Mac was the tainted variant.
- Protective gap: The discrepancy between Ledger’s macOS offering on the official site and the App Store’s listing created an exploitable gap that attackers attempted to exploit repeatedly in the past, including a separate incident targeting the Microsoft Store in 2023.
- PLATFORM RESPONSE AND CONSEQUENCES
- Immediate action: After extensive user reports, Apple removed the fake app from the App Store.
- Financial consequences for platforms: KuCoin announced that it had frozen the accounts involved in the latest scheme; the freeze was set to last until April 20, with possible extension upon official law enforcement requests.
- Ongoing risk management: The incident underscores the risk of third-party app distribution channels and the importance of validating the publisher’s identity and app provenance before authorizing seed/recovery inputs.
- CONTEXT AND PRECEDENTS
- Historical attempts: Earlier attacks targeted other platforms, including a 2023 incident where a fake Ledger app appeared in the Microsoft Store and resulted in $768,000 in crypto theft.
- Industry caution: The episode illustrates the persistent threat of supply-chain and distribution-channel misuse, where legitimate-seeming software can be weaponized to harvest seed phrases and compromise millions in digital assets.
- KEY TAKEAWAYS
- Seed phrase security: Never enter seed/recovery phrases into any application, especially ones that request wallet credentials outside of a trusted, offline hardware environment.
- App provenance: Verify the publisher, developer, and source prior to installing wallet-related software from app stores or third-party sites.
- Platform gaps: Be aware that official software offered directly by wallet providers may not always be available through every storefront; always cross-check against the provider’s official site.
- Investigation tools: Researchers continue to map takedown chains and laundering paths to better disrupt criminal networks and inform enforcement actions.
- Industry implications: This event highlights the ongoing need for robust app vetting on major storefronts and for users to exercise heightened skepticism with wallet-related software.
- CLOSING CONTEXT
- The incident demonstrates how quickly a fake application can cause widespread financial harm in a short window.
- It also shows the importance of coordinated responses among platform operators, exchanges, and investigators to freeze, trace, and mitigate the impact of such scams.