Technology

A Fake Ledger Live App Slipped Past Apple's App Store Review and Drained $9.5 Million From 50 Victims in One Week

A fraudulent clone of Ledger Live, published under the developer name "Leva Heal Limited" and available on Apple's App Store for approximately two weeks, was linked by blockchain investigator ZachXBT to at least $9.5 million in crypto theft from more than 50 victims between April 7 and April 13.

Written By :
MINRK
MINRK
A Fake Ledger Live App Slipped Past Apple's App Store Review and Drained $9.5 Million

1. A Week-Long Theft Hidden in Plain Sight

For approximately two weeks, a malicious application masquerading as Ledger Live — the official wallet management software for Ledger hardware wallets — sat in Apple's App Store under the developer name "Leva Heal Limited," available for download by anyone searching for the legitimate product. Between April 7 and April 13, that app drained at least $9.5 million from more than 50 victims across Bitcoin, Ethereum, Solana, Tron, and XRP networks.

The mechanism was brutally simple. The fake app looked like Ledger Live. The branding, the interface, and the user flow were designed to be indistinguishable from the legitimate application for users who had not previously used the real software. When the app prompted users to enter their recovery phrase — the 12 to 24 word seed that provides master access to every wallet controlled by a Ledger hardware device — victims complied, believing they were performing a legitimate setup or recovery step. The moment the seed phrase was entered, the attackers had everything they needed to reconstruct every wallet on the victim's hardware device and drain all assets across all connected chains.

Apple removed the fake app on April 14 after ZachXBT's public disclosure of the theft campaign, but questions about how a malicious application with this theft mechanism passed the App Store review process remain unanswered.

2. The Victims: A Decade of Savings Gone in an Instant

The human cost of the campaign is documented in the victim accounts that emerged on social media after ZachXBT's Telegram post traced the stolen funds. A user posting on X under the handle @glove described losing 5.9 BTC — the entirety of savings accumulated over a decade, intended as a retirement fund — after downloading what he believed was the official Ledger app while setting up a new computer.

"I lost my retirement fund in a hack/scam," he wrote. "All my BTC gone in an instant. I worked ten years for this. Be careful out there." The 5.92 BTC represented approximately $432,000 at current prices. For the victim, it was not a speculative position that could be recovered through continued investment — it was the accumulated store of decade-long savings that crypto holders often cite as the primary reason for using hardware wallets rather than exchange custody. The hardware wallet was supposed to be the security solution; the fake app that drained it exploited exactly the user behavior that hardware wallet adoption was designed to protect against.

The three largest single victims each lost seven-figure sums: $3.23 million in USDT on April 9, $2.08 million in USDC on April 11, and $1.95 million across Bitcoin, ETH, and stETH on April 8. The scale of the individual losses suggests these were not small retail holders — the seven-figure victims were likely high-net-worth individuals or small institutional participants who were using hardware wallets precisely because they had assets worth securing professionally.

3. How the Fake App Passed Apple's Review

The presence of a functional seed phrase harvesting application on Apple's App Store for approximately two weeks raises specific questions about the effectiveness of the review process that Apple represents as one of its primary justifications for the App Store's closed ecosystem model.

The fraudulent app was published under the developer name "Leva Heal Limited" — an obscure entity without any public presence or established reputation. The legitimate Ledger Live software is distributed by Ledger SAS, a well-known French hardware wallet manufacturer, not by "Leva Heal Limited." Basic verification of developer identity against the claimed application's provenance should have been sufficient to reject the fraudulent app at the review stage.

Additionally, the legitimate Ledger software for desktop platforms is distributed exclusively through Ledger's own website — not through the Mac App Store. While a legitimate iOS version exists for iPhone use on the Apple App Store, Ledger does not distribute a macOS application through the App Store. The presence of a Mac App Store entry for a software product that the legitimate developer does not distribute through that channel is itself a discrepancy that should have triggered scrutiny. Community members on Reddit identified the developer identity discrepancy and warned other users before Apple's takedown, suggesting the information was available to reviewers who were looking for it.

4. The Seed Phrase as the Single Point of Failure

The attack's mechanics center on a fundamental misunderstanding that many hardware wallet users have about when and why a seed phrase should be entered into any software application. The seed phrase — the 12 to 24 word mnemonic that encodes the private keys for every wallet derived from a hardware device — is meant to be written on paper, stored securely offline, and used only in the specific circumstance of restoring a hardware wallet from physical backup.

No legitimate hardware wallet software, including the real Ledger Live, ever asks users to enter their full seed phrase into the application. The hardware device itself is the security boundary: the seed phrase is stored inside the device's secure element and never leaves the hardware. Ledger Live communicates with the device to access wallet functionality without ever requiring — or being able to access — the seed phrase itself. Any application that prompts for a seed phrase is, by definition, either a recovery tool for a specific restoration scenario or a malicious application attempting to steal the phrase.

Security experts have communicated this rule repeatedly across the crypto security community: if any app, website, or person asks for your seed phrase, stop immediately. The rule is simple and absolute. Yet the attack campaign generated $9.5 million in losses from more than 50 victims who either had not internalized the rule or were in a circumstance — setting up a new computer, establishing the Ledger Live connection for the first time — where they believed entering the phrase was the correct action.

5. ZachXBT's Investigation and the KuCoin Trail

The theft campaign was brought to public light primarily through the work of blockchain investigator ZachXBT, whose Telegram post on April 14 traced the stolen funds and identified the laundering infrastructure the attackers used. ZachXBT identified the theft addresses across Bitcoin, EVM networks, Tron, Solana, and XRP, connected the individual theft incidents to the single fake application campaign, and traced the fund flows through the laundering chain.

The stolen funds were routed through more than 150 KuCoin deposit addresses — a centralized exchange that serves as the on-ramp between the victim's blockchain and the attacker's fiat conversion or further laundering process. From KuCoin, the funds flowed into AudiA6, a centralized crypto mixing service that ZachXBT described as known for charging high fees specifically to obfuscate illicit transaction origins. The use of a centralized mixing service rather than a decentralized tumbler or chain-hopping obfuscation reflects either the attackers' preference for established laundering services or a specific operational relationship with AudiA6.

ZachXBT noted that KuCoin has seen a rise in illicit fund flows over the past year, and that he had separately traced approximately 54 BTC worth about $3.7 million in Bitcoin Depot theft to KuCoin wallets in a contemporaneous investigation. The pattern of using KuCoin as the primary laundering on-ramp across multiple unrelated theft campaigns suggests that the exchange's compliance controls have not been effective at identifying and blocking the deposit addresses being used for illicit fund routing.

6. KuCoin's Regulatory Troubles and Compliance Questions

The routing of $9.5 million in stolen funds through KuCoin deposit addresses highlights a specific and commercially significant irony for the exchange, which has been navigating a difficult regulatory period. KuCoin paid more than $300 million to U.S. authorities in January 2025 to settle Anti-Money Laundering violations — one of the largest AML settlements in crypto exchange history. The settlement was supposed to mark the company's commitment to improved compliance.

Less than a year after that settlement, Austrian regulators barred KuCoin from onboarding new EU users in February 2026 — just months after the exchange had received its MiCA license under the European Union's new crypto asset regulation framework. The Austrian action suggests that KuCoin's compliance improvements from the U.S. settlement have not translated to equivalent capability in the European regulatory environment. The use of KuCoin deposit addresses as the primary laundering infrastructure for a $9.5 million theft campaign that was publicly documented in real time by ZachXBT adds a specific and verifiable instance of illicit fund routing to that compliance record.

7. The Apple App Store Liability Question

ZachXBT publicly suggested that Apple could face a class-action lawsuit for allowing the fake app to pass its review process, and legal experts and community members have engaged with the question of Apple's liability since the incident was disclosed. The legal theory would center on whether Apple's representations about the App Store review process — which it markets as a security benefit of the closed ecosystem — created a duty of care to users who rely on those representations when downloading applications.

Apple's terms of service disclaim liability for third-party applications, and its review process does not constitute a guarantee of application safety — these are the standard defenses that would be invoked against any lawsuit. However, the specific circumstances of this case — a clearly fraudulent application published under an unknown developer name impersonating a well-known legitimate product, the absence of which from the App Store is publicly documented — may strengthen the argument that Apple's review process fell below the standard that its marketing representations imply.

The question is likely to remain contested regardless of any legal proceedings. The App Store review process is inherently limited in its ability to detect applications that are functionally correct — they perform exactly the advertised function — but are designed to steal data that users voluntarily enter. Detecting social engineering attacks that rely on user error rather than technical vulnerability requires a different category of review analysis than detecting malicious code.

8. The Context: $17 Billion in Crypto Scam Losses in 2025

The fake Ledger app campaign occurs against a backdrop of escalating social engineering attacks in the crypto industry. In 2025, crypto users lost an estimated $17 billion to hacks, scams, and fraud — with social engineering and phishing wallet recovery tactics identified as among the most effective attack vectors. The theft methodology does not require any technical sophistication: it requires only convincing victims to take an action they would not take if they understood what they were doing.

Fake applications on trusted platforms — App Store, Google Play, official-looking websites — are among the most effective social engineering vectors because they exploit the trust that users extend to platforms they believe have verified the legitimacy of listed applications. The App Store's walled garden model explicitly markets security verification as a benefit of the closed ecosystem, creating exactly the trust that makes fake App Store listings more effective than fake websites where users have less expectation of verification.

The $9.5 million theft in one week from 50 victims is, in the broader context of crypto security losses, a relatively contained incident. The Bybit hack in February 2025 lost $1.5 billion in thirty minutes; the Drift Protocol infiltration lost $270 million over six months. But the fake Ledger app represents a different category of harm — not sophisticated state actor exploitation of protocol vulnerabilities, but a simple confidence trick that destroyed a decade of savings for an ordinary user who made a single mistake.

9. What Ledger Users Should Know

For Ledger hardware wallet users, the fake app incident reinforces several specific security practices that the company has communicated but that the attack demonstrates many users have not fully internalized.

Ledger distributes its Ledger Live desktop software exclusively through its official website at ledger.com — not through the Mac App Store, not through third-party software repositories, not through any other distribution channel. The only way to obtain the legitimate macOS version of Ledger Live is to download it directly from Ledger's website after verifying the website's authenticity. An App Store listing for a Mac application called "Ledger Live" is not and has never been legitimate, regardless of how convincing the branding appears.

The seed phrase should never be entered into any computer application, including the legitimate Ledger Live. The hardware device is specifically designed so that the seed phrase never needs to leave the physical device. Any application that prompts for the full 12 to 24 word recovery phrase should be immediately closed and reported. This rule has no exceptions in the context of normal hardware wallet operation.

10. The Recurring Pattern and the Industry's Responsibility

The fake Ledger app campaign is not an isolated incident — it is the latest occurrence of a recurring pattern in which malicious actors impersonate legitimate crypto wallet applications to harvest seed phrases and drain wallets. Multiple previous Ledger impersonations have been documented on both the App Store and Google Play over the past several years. Each occurrence generates community discussion about app store review processes and user security education. Each occurrence is followed by the same theft mechanism extracting funds from the same category of victim: a user who has done everything right — purchased a hardware wallet, stored assets in self-custody — except internalized the one rule that the attack exploits.

The industry's collective responsibility for addressing this recurring pattern involves both the platform operators — Apple and Google, who review applications before listing them — and the wallet manufacturers and security community, who need to make the seed phrase rule so universally understood that it becomes instinctive rather than something that can be overridden by a convincing fake application interface. The $9.5 million total in one week represents individual tragedies for the victims, but the aggregate pattern represents a systemic security education failure that the industry has not yet successfully addressed.

Related Articles

NEWSLETTERS

Don't miss another story.

Subscribe to the MINRK Newsletter today.

By signing up, you will receive emails about MINRK products and you agree to our terms of use and privacy policy.

Crypto Daybook Americas

Market analysis for crypto traders and investors.

EVERY WEEKDAY

Crypto for Advisors

Defining crypto, digital assets and the future of finance for financial advisors.

EVERY THURSDAY

The Protocol

Exploring the tech behind crypto one block at a time.

WEEKLY

Crypto Long & Short

A must read for institutions. Insights, news and analysis delivered weekly.

EVERY WEDNESDAY

CoinDesk Headlines

The biggest crypto news and ideas of the day.

EVERY WEEKDAY

State of Crypto

Examining the intersection of cryptocurrency and government.

WEEKLY

Research Reports

Join thousands of readers who rely on MINRK for data-driven insights on the latest digital asset trends.

MONTHLY