SlowMist Flags Snap Store Attack Targeting Crypto Seed Phrases

TheNewsCryptoОпубликовано 2026-01-21Обновлено 2026-01-21

Введение

Blockchain security firm SlowMist has identified a new Linux-based threat targeting cryptocurrency users through the Snap Store. Attackers hijack trusted publisher accounts by exploiting expired domains, then push malicious updates to popular wallet apps like Exodus, Ledger Live, and Trust Wallet. These fake apps prompt users to enter their recovery phrases, which are then stolen, enabling attackers to drain funds. This supply-chain attack exploits user trust in official update channels, making it highly effective. SlowMist warns users to verify publishers and avoid entering seed phrases on unfamiliar platforms, highlighting a growing trend of infrastructure-focused attacks in crypto security.

Blockchain security firm SlowMist has flagged a new Linux-based threat that targets crypto recovery phrases by exploiting trusted apps distributed through the Snap Store. The company warned that attackers are hijacking long-standing Snap Store publisher accounts and pushing malicious wallet updates through official distribution channels, putting long-time Linux users at risk.

In a post on X, SlowMist chief information security officer 23pds said attackers are abusing expired domains linked to legitimate Snap Store publishers. After regaining control of those domains, the attackers reset account credentials, take over trusted developer accounts, and publish malware disguised as wallet software updates. This tactic gives the attack a dangerous advantage: users often trust updates from established publishers and install them without suspicion.

Once the malicious apps land on a victim’s system, they prompt users to enter crypto wallet recovery phrases. The malware then exfiltrates those phrases, allowing attackers to drain wallets quickly, often before the victim realizes anything went wrong.

Attackers hijack Snap Store publishers using expired domains

The Snap Store is the official app store for Linux, used for the distribution of software that is packaged as “snaps.” It is considered a trusted source by many users, just like the App Store or Microsoft Store, as it provides verified publishers, easy updates, and a centralized distribution.

SlowMist said attackers are targeting publisher accounts tied to domains that have expired. Once a domain expires, criminals can re-register it and gain access to domain-linked email addresses. From there, they can initiate password resets and seize control of Snap Store developer accounts.

This method enables attackers to compromise publishers with active users and existing download histories. Rather than depending on victims to download the malicious new apps, they inject the malware into the regular updates. This supply chain tactic increases the success rate because users are more likely to accept updates and not check all the changes.

SlowMist has identified at least two domains associated with the compromised publisher accounts: “storewise[.]tech” and “vagueentertainment[.]com.” Once the attackers hijacked the accounts, they allegedly used the apps to impersonate popular crypto wallet brands.

Fake wallet apps mimic trusted brands

According to SlowMist, the affected Snap Store apps are clones of popular wallet applications like Exodus, Ledger Live, and Trust Wallet. Attackers use user interfaces that closely resemble legitimate applications, which increases credibility and reduces suspicion.

These apps, after being installed or updated, will ask the user to input their wallet recovery phrase with the intention of wallet setup, sync, or account verification. After the user has provided the wallet recovery phrase, the attacker can use this phrase to restore the wallet and drain its funds without needing any further access to the victim’s device.

This approach remains very effective because seed phrases provide full control of the assets. Even the strongest passwords and device security cannot protect funds once hackers possess the recovery phrase.

Supply-chain hacks grow more damaging

The incident at the Snap Store is part of a larger trend in crypto security, where attackers are moving from exploiting protocols to compromising infrastructure. Instead of attacking smart contracts directly, criminals increasingly target trusted software distribution systems, update channels, and third-party service providers.

CertiK data shared with the media house in December showed crypto hack losses reached $3.3 billion in 2025, even though the number of incidents declined. According to CertiK, the losses were more concentrated in fewer but more serious supply chain events, with $1.45 billion in losses being attributed to only two major incidents.

This trend indicates that attackers are optimizing for scale and impact. With the improvement of DeFi security at the smart contract level, attackers target the weakest links, apps, publishers, and update infrastructure, where trust is the biggest vulnerability.

What users should watch next?

For Linux users who keep crypto, the wallet software download and update processes must be done with extra care. Users need to verify the identity of the publishers, check the official download sources, and avoid entering recovery phrases on unfamiliar platforms. Security teams may also need to monitor Snap Store listings more closely, especially when there are sudden changes in the ownership of publishers.

The takeaway from the SlowMist alert is clear: the greatest danger now often comes from trusted sources, not the obvious phishing scams.

Highlighted Crypto News:

Tom Lee Warns Crypto Markets Could Face Painful Correction in 2026

TagsBlockchaincrypto securitylinuxSmart ContractSupply chain

Связанные с этим вопросы

QWhat is the new threat flagged by SlowMist that targets crypto recovery phrases?

ASlowMist has flagged a new Linux-based threat that targets crypto recovery phrases by exploiting trusted apps distributed through the Snap Store. Attackers hijack long-standing publisher accounts and push malicious wallet updates.

QHow do attackers gain control of trusted Snap Store publisher accounts?

AAttackers abuse expired domains linked to legitimate publishers. They re-register the expired domains, gain access to domain-linked email addresses, reset account credentials, and take over the trusted developer accounts.

QWhich popular crypto wallet brands are being impersonated by the malicious apps in this attack?

AThe malicious apps are clones that impersonate popular crypto wallet brands like Exodus, Ledger Live, and Trust Wallet.

QWhy are supply-chain attacks like the one on the Snap Store becoming more damaging according to the article?

ASupply-chain attacks are becoming more damaging because attackers are targeting trusted software distribution systems and update channels, leading to fewer but more serious incidents with concentrated losses, as seen in the $1.45 billion attributed to just two major events in 2025.

QWhat precautions should Linux users take to protect themselves from such threats?

ALinux users should verify the identity of publishers, check official download sources, avoid entering recovery phrases on unfamiliar platforms, and monitor Snap Store listings for sudden changes in publisher ownership.

Похожее

Solana Q1 Report: Revenue Plunges 68% Year-on-Year, Developers Decrease by 30%

Solana Q1 2026 Report: Key Metrics Show Significant Decline Amid Market Reset Solana experienced a substantial downturn in Q1 2026, with key performance indicators reflecting a broader market cooling. Total network revenue (REV) fell to $89.9 million, down 68% year-over-year (YoY) and 1.4% quarter-over-quarter (QoQ). This decline was driven by reduced speculative activity, which had previously fueled the network during the 2024/2025 bull market. Key revenue components saw mixed results: base fees dropped 8.7% QoQ, Jito tips (MEV) fell 19.7%, priority fees rose 23%, and vote fees declined 44.5%. The annualized real yield for stakers was just 0.17%, down 67% YoY. Network GDP, generated by top applications, fell 7% QoQ to $451 million. Pump Fun emerged as a standout, generating $103 million (up 3% QoQ), surpassing Solana's L1 revenue. However, daily active addresses averaged 2.4 million, down 4.8% YoY. Stablecoin supply on Solana reached $15.9 billion, down 2.7% QoQ but up 18% YoY. USDC and USDT remained dominant. DEX volumes averaged $3.2 billion daily, with private DEXs now accounting for 60% of all volume. The network's net dilution rate was 4.38%, while the cost to produce $1 of REV was $8.10, up 93% YoY. The number of new tokens created on launchpads grew 42% QoQ to 3 million, with Pump Fun dominating 85% of this market. Despite the downturn, Solana's core strengths remain: its position as a hub for retail trading apps, potential in perpetual markets, and growing use in stablecoin-based fintech applications, particularly in Latin America. However, developer activity declined 32% YoY, slightly worse than Ethereum's 29% drop. The network must now focus on attracting traditional finance, competing in perpetual markets, and sustaining developer ecosystem growth to drive the next expansion cycle.

marsbit35 мин. назад

Solana Q1 Report: Revenue Plunges 68% Year-on-Year, Developers Decrease by 30%

marsbit35 мин. назад

Торговля

Спот
Фьючерсы
活动图片