
Over 20 dangerous apps have infiltrated the Play Store, posing as crypto wallets and stealing user data. Find out which apps to delete now and how to stay safe.
Delete These 20 Apps Right Now If You Downloaded Them from the Play Store — They’re Malicious
As a senior technology journalist who has spent years tracking malware threats and digital deception, it’s disheartening to see yet another wave of malicious apps infiltrating the very store millions rely on for safe downloads: the Google Play Store.
In a recent discovery, cybersecurity researchers from Cyble’s CRIL team have unearthed over 20 deceptive Android apps disguised as legitimate cryptocurrency wallets and exchanges. These apps are not just annoying — they’re dangerous. Once installed, they can silently harvest sensitive information, including your 12-word crypto wallet recovery phrase, putting your digital assets at serious risk.
Let me walk you through what you need to know and, more importantly, what you need to do — immediately.
The Threat: Malicious Crypto Wallet Apps
The malicious apps discovered were designed to impersonate widely used crypto platforms like PancakeSwap, SushiSwap, Raydium, and more. The attackers used a cunning strategy — by mimicking real app names and interfaces, they created a false sense of trust.
Once a user downloads the app and enters their recovery phrase or private credentials, the data is stealthily sent to the attackers’ remote servers. From there, your digital wallet can be drained in seconds.
This tactic preys on the rising popularity of cryptocurrency among everyday users — people who may not always know the red flags of phishing and malware-laden apps.
List of Malicious Apps You Must Delete Right Now
Here are some of the apps identified as malicious:
- Pancake Swap
- Suiet Wallet
- Hyperliquid
- Raydium Wallet
- BullX Crypto
- OpenOcean Exchange
- Meteora Exchange
- SushiSwap (fake version)
- Harvest Finance Blog
- BitKeep Wallet Clone
- SafePal Clone
- KuCoin Lite Clone
- Trust Wallet Scam Version
- Coin98 Fake App
- Phantom Wallet Imitator
- Solflare (scam version)
- Zapper Wallet Phishing App
- TokenPocket Impersonator
- MetaMask Copy
- Crypto.com Lookalike
It’s important to note that these apps often share names with legitimate services, but they are imposters, distributed via compromised developer accounts or using deceptive packaging techniques.
How These Apps Passed Google’s Defenses
Despite Google Play’s security layers, attackers used a combination of evasion techniques:
- Cloning App Icons and UI: Making them look like official apps.
- Using WebView: Loading legitimate web content while capturing input fields like recovery phrases.
- Delayed Payload Activation: Malware would activate after a few hours or actions, avoiding immediate detection by Play Protect.
This means even vigilant users can fall for these traps, especially when an app appears polished and professional.
What to Do if You Installed One of These Apps
If you recognize any of the apps above on your phone, act now:
- Uninstall Immediately: Go to your device settings or Play Store and remove the app.
- Reset Your Wallet: If you entered your crypto recovery phrase, assume it’s compromised. Use a new wallet and transfer your funds immediately.
- Scan Your Device: Use a trusted mobile antivirus or malware scanner like Malwarebytes or Bitdefender.
- Report the App: Use the “Flag as Inappropriate” option in the Play Store to alert Google.
The Bigger Picture: Why This Keeps Happening
The truth is that malicious developers are becoming more sophisticated, and they’re moving faster than many app store defenses can adapt. In the case of cryptocurrency apps, the stakes are high, and attackers are well-funded.
This episode is a wake-up call for users and developers alike. Even on trusted platforms, due diligence is essential. Trust should not be given lightly — especially when it comes to apps asking for your crypto keys or financial information.
Tips to Stay Safe Moving Forward
- Download Only From Official Links: Visit the website of a crypto wallet or exchange and download the app from their link.
- Verify Developer Information: Always check the developer’s name and app reviews before downloading.
- Use Play Protect: Keep it turned on, and allow automatic app scanning.
- Avoid New Apps Without Reviews: If it looks new and has few reviews, be skeptical.
- Educate Yourself: Understanding phishing, social engineering, and mobile malware can go a long way.
In my years covering cybersecurity, one constant remains: the human element is the weakest link — and also our greatest defense. Technology will continue to evolve, and so will cyber threats. But with awareness, vigilance, and a healthy dose of skepticism, we can protect ourselves.
Today, that starts with opening your phone, checking your apps, and deleting anything suspicious.
Stay safe, stay informed — and as always, verify before you trust.
Also read : Prudent Financial Management Amid Global Economic Challenges
Last Updated on: Thursday, June 12, 2025 12:04 pm by Economic Edge Team | Published by: Economic Edge Team on Thursday, June 12, 2025 12:04 pm | News Categories: Technology
Leave a Reply