Cointime

Download App
iOS & Android

SlowMist: Investigation and Analysis of Third-party Sources of Fake Web3 Wallets

Background

Web3, which is powered by blockchain technology, is spearheading the next phase of the technological revolution, with an increasing number of individuals getting involved in this encryption wave. However, Web3 and Web2 are two distinct worlds, with the former being a dark forest that offers diverse opportunities and risks. In this regard, the wallet serves as the entryway and pass to the Web3 world.

As you explore and interact with various blockchain-related applications and websites in the Web3 world through your wallet, you’ll realize that each application on a public chain uses a wallet to “log in.” This differs from the traditional “login” method in Web2, where accounts between different applications are not interconnected. Conversely, in the Web3 world, all applications employ wallets uniformly for “log in” purposes. Furthermore, when you “connect” to a wallet, it’s not displayed as “Login with Wallet,” but instead as “Connect Wallet.” Essentially, the wallet is the sole means of accessing the Web3 world.

As the saying goes, “where there’s light, there’ll be a shadow.” In this scorching Web3 environment, wallets, as entry-level applications, have naturally become targets of the black and gray industry chain.

Due to various reasons, such as lack of support for Google Play on certain phones or network-related problems, many individuals opt to download Google Play apps from alternative sources, such as apkcombo, apkpure, and other third-party download sites. These sites often assert that their apps are downloaded from the Google Play mirror, but their actual security remains questionable.

Website Analysis

Given the numerous downloading options, let’s take a look at apkcombo as an example. Apkcombo is a third-party app market that claims to offer applications sourced mainly from other legitimate app stores. But is this really the case?

Let’s first look at the traffic volume of apkcombo:

According to the data analytics website, SimilarWeb, apkcombo website ranks:

Global Rank: 1,809Country Rank: 7,370Category Rank: 168

We can see that its influence and traffic are both very significant.

Apkcombo provides a default Chrome APK download plugin, which has over 100,000+ users:

So, returning to our focus on the wallet sector in the Web3 field, how secure are the wallet applications downloaded from these sources?

Let’s take the well-known imToken wallet as an example. Its legitimate download channel on Google Play is:

https://play.google.com/store/apps/details?id=im.token.app

Due to certain phones lacking Google Play support or network issues, numerous individuals prefer to download Google Play apps from sources other than the official platform.

The download path for the apkcombo mirror site is: https://apkcombo.com/downloader/#package=im.token.app

The image above reveals that apkcombo offers version 24.9.11, which imToken has verified to be a non-existent version. This confirmation solidifies the fact that this is currently the most widespread fraudulent version of the imToken wallet available.

As of the writing of this article, the imToken wallet’s latest version is 2.11.3, which has a comparatively high version number, potentially utilized to mask itself as the most up-to-date version.

The image below illustrates that this fraudulent wallet version on apkcombo has a substantial download count, which is most probably sourced from Google Play’s download information. In the interest of security, we deem it crucial to expose the origin of this malevolent app to discourage further downloads of this counterfeit wallet.

Meanwhile, we found similar download sites such as: uptodown. Download link: https://imtoken.br.uptodown.com/android

We discovered that on uptodown, anyone can publish apps with minimal cost, therefore making phishing attacks more accessible:

Wallet Analysis

As we have previously examined various cases of counterfeit wallets, including the one reported in “SlowMist: Fake wallet app has stolen millions of dollars from over 10,000 users” published on November 24, 2021, we will refrain from delving into further detail here.

Our analysis will specifically focus on the counterfeit wallet offered by apkcombo, version 24.9.11. During the process of creating or importing a wallet mnemonic on the startup interface, the fake wallet will transmit the mnemonic and other sensitive data to the phishing website’s server, as exemplified in the following image:

According to the reverse APK code and analysis of traffic packets, the method used to send the mnemonic is: https://api.funnel.rocks/api/trust?aid=10&wt=1&os=1&key=<助记词>

As seen in the image below, the earliest “api.funnel.rocks” certificate appeared on June 3, 2022, which is likely when the attack began:

As the saying goes, a picture is worth a thousand words, so here is a flowchart we have created:

Conclusion

Currently, this type of scam is not only active but also expanding in scope, with new victims falling prey to it every day. As users are the weakest link in the security system, they must remain vigilant, enhance their security and risk awareness, and always use official download channels and verify information from multiple sources when using wallets and exchanges. If you have downloaded a wallet from the above-mentioned mirror sites, transfer your assets immediately, uninstall the software, and verify the information through official verification channels if necessary.

To guarantee the safety of your wallet, it is crucial to exclusively use the official websites of renowned wallet applications.

  • imToken:https://token.im/
  • TokenPocket:https://www.tokenpocket.pro/
  • TronLink:https://www.tronlink.org/
  • Bitpie:https://bitpie.com/
  • MetaMask:https://metamask.io/
  • Trust Wallet:https://trustwallet.com/

Continue following the SlowMist Security Team for more Web3 security risk analysis and alerts.

Thanks to @imTokenOfficial for providing official verifiable support during the traceability process.

To protect confidentiality and privacy, this article provides only a brief overview of the issue. SlowMist advises users to increase their understanding of security, improve their capacity to recognize phishing attacks, and refrain from becoming victims of such schemes. To gain more knowledge about security, individuals can refer to the “Blockchain dark forest selfguard handbook” published by SlowMist.

Read more: https://slowmist.medium.com/slowmist-investigation-and-analysis-of-third-party-sources-of-fake-web3-wallets-dfaaf820b804

Comments

All Comments

Recommended for you

  • BTC breaks through $62,000, and the intraday decline narrows to 2.96%

    According to market data, BTC has broken through $62,000 and is currently trading at $62,008.36. The intraday decline has narrowed to 2.96%, and the market is experiencing large fluctuations, so please be prepared for risk control.

  • Tether issued USDT worth $437 million yesterday

    Tether issued $437 million worth of USDT on April 17 and redeemed $142 million worth of USDT (a net increase of 295 million USDT in circulation). Approximately $100 million worth of USDT was issued to an address starting with 0x5c (suspected to be a Bitfinex forwarding address), and approximately $81 million worth of USDT was issued to an address starting with 0x77 (suspected to be Bitfinex wallet address 1).

  • Ordinals founder confirms that the Runes protocol only hard-codes rune number 0

    On April 18th, Casey Rodarmor, the founder of Ordinals, stated during a Discord community meeting that the Runes protocol only hardcodes the 0th rune, which is "UNCOMMON•GOODS". The other nine token names are not hardcoded into the Runes protocol due to a lack of good ideas. According to Casey's previous plan, the Runes protocol will hardcode the first 10 runes, which are numbered 0-9.

  • The number of Ordinals inscriptions exceeds 70 million

    The Bitcoin Ordinals browser Ord.io posted on X platform, stating that the number of Ordinals inscriptions has exceeded 70 million.

  • Grayscale GBTC assets under management fell to $18.82 billion

    On April 18th, according to official data from Grayscale, as of April 17th local time, GBTC held 308,593.8819 BTC, a decrease of 1277.5014 compared to the previous trading day. In addition, GBTC's assets under management (non-GAAP) were $18,823,819,454.54, with circulating shares of 346,460,100.

  • There are only about 2 days left until the Bitcoin block reward is halved

    Data shows there are still 298 blocks left until the Bitcoin block reward is halved, which is approximately 1 day, 23 hours and 10 minutes.

  • BTC falls below $60,000

    According to market data, BTC has fallen below $60,000 and is currently trading at $59,951.1, with a daily decline of 3.16%. The market is volatile, so please take precautions to manage your risks.

  • BTC falls below $61,000

    Market data shows BTC has fallen below $61,000 and is currently trading at $60,900, with a daily decline of 2.24%. The market is experiencing significant fluctuations, so please be prepared for risk management.

  • ETH falls below $3,000

    The market shows ETH has fallen below $3,000, currently trading at $2,999, with a daily decline of 2.92%. The market is volatile, so please be prepared for risk control.

  • BTC falls below $62,000

    According to market data, BTC has fallen below $62,000 and is now trading at $61,955, with a daily decline of 1.04%. The market is volatile, so please be prepared for risk control.