Ledger Scam: $9.5 Million Stolen Through Fake App in the App Store

Share

On April 13, 2026, a fake Ledger Live app duped hundreds of users in Apple’s App Store. At least $9.5 million in cryptocurrencies were stolen. Singer G. Love (Garrett Dutton) lost 5.9 BTC ($420,000) accumulated over ten years. The incident exposes critical gaps in Apple’s moderation system and raises serious questions about wallet app security on centralized platforms.


The cryptocurrency world has just experienced one of the most alarming security incidents of 2026. While iPhone and Mac users trust Apple’s App Store as a reliable guardian of software security, a fake Ledger Live app managed to pass all of Cupertino’s moderation filters and install itself on thousands of devices.

The scam was ruthlessly simple. Criminals created an app nearly identical to the official Ledger Live software, produced by Ledger SAS, the French company specializing in hardware security keys for cryptocurrencies. The app impersonated not only the name and icon of the legitimate application but also its user interface, making the deception extremely difficult to spot for an untrained eye.

On-chain analyst ZachXBT was the first to alert the community about the scale of the disaster. According to his investigations, at least $9.5 million in cryptocurrencies were stolen through this fake application. This amount makes it one of the most significant mobile app frauds ever documented in the crypto ecosystem.

One of the most poignant cases reported involved Garrett Dutton, better known by his stage name G. Love, singer of blues hip-hop group G. Love & Special Sauce. Dutton publicly revealed losing 5.9 bitcoins — approximately $420,000 at current prices — after installing the fake app on a new computer and entering his seed phrase.

Here is what happened: after purchasing a new computer, Dutton downloaded Ledger Live from the App Store, as he had done dozens of times before. Except that this time, the downloaded app was not the official one. It was a malicious replica designed to capture users’ private keys. By entering his seed phrase to « restore » his wallet, Dutton effectively handed his private keys over to the scammers.

The cruelty of the incident lies in the fact that these 5.9 BTC represent ten years of cryptocurrency savings. Dutton had meticulously accumulated bitcoins over a decade, probably during the period when BTC was worth only a few hundred dollars. Within minutes, everything was gone.

Analyst ZachXBT traced the path of the stolen funds with remarkable precision. According to his investigation, the diverted assets were transferred to deposit addresses on the KuCoin exchange through a series of transactions designed to obscure the trail. KuCoin was used as a laundering platform, with criminals converting the cryptocurrencies into harder-to-trace assets afterward.

This « chain hopping » technique — rapidly transferring between different blockchains or tokens to mask the origin of funds — has become the standard operating procedure for cryptocurrency thieves. It exploits the fact that most exchange platforms perform identity verification only during withdrawals, not deposits, allowing criminals to deposit dirty funds without immediate detection.

The most troubling revelation of this incident concerns Apple itself, not the pirates. How did a fake Ledger app get published on the App Store, when Ledger SAS has offered its own official app for years — an app perfectly identified by millions of users?

This question raises deep doubts about the App Store’s moderation processes. Apple partly justifies its store’s security through manual application verification and strict developer controls. But the presence of a fake Ledger Live app for an undisclosed period suggests these safeguards do not work properly when it comes to financial and cryptocurrency applications.

For users in the crypto ecosystem, this incident is a painful reminder: even platforms considered reliable by the general public can be breached. Storing private keys on an internet-connected computer, particularly via a mobile app, remains a high-risk practice.

Ledger SAS, for its part, hastily reminded users of good security practices. The cardinal rule — that every hardware wallet owner should know — is simple: never enter your seed phrase into a mobile application or internet-connected computer.

A hardware wallet like Ledger Nano is designed to keep private keys offline. During initial setup or wallet restoration, the seed phrase should only be entered on the physical device, never on a software wallet or third-party app. It is precisely this rule that victims of the fake app violated, as the fraudulent app requested the seed phrase under the pretext of « wallet restoration. »

Security experts now recommend the following practices:

  • Always verify the app publisher before downloading (Ledger SAS is the only official publisher)
  • Never enter your seed phrase on a software wallet or mobile application
  • Purchase hardware wallets only from Ledger’s official website or authorized resellers
  • Consider using a steel seed plate for physical protection of the seed phrase against fire and damage

While the Ledger affair dominated security news, another less publicized but equally significant incident occurred on April 13, 2026. The Hyperbridge cross-chain protocol was victim to an attack that allowed an unidentified attacker to mint 1 billion DOT tokens on the Ethereum network.

Hyperbridge is a cross-chain bridge protocol that allows transferring assets between different blockchains, notably between Polkadot and Ethereum. According to analyses by CertiK, a blockchain security firm, the attacker exploited a vulnerability in the protocol’s smart contract to obtain administrative privileges.

Once admin access was obtained, the attacker was able to execute the protocol’s mint function, creating 1 billion equivalent DOT tokens on the Ethereum network (ERC-20 DOT). This quantity represents a significant fraction of DOT’s total supply, and above all, considerable market value.

The attacker then sold the entire 1 billion minted DOT tokens in a single transaction, pocketing 108.2 ETH — approximately $237,000 at current prices. A modest amount compared to other DeFi exploits, but the incident is no less serious for the protocol and its users.

Following public disclosure of the incident, the DOT price dropped 4%, falling to $1.19. This market reaction, while significant in percentage terms, remains limited in absolute value, suggesting market participants quickly understood the incident only affected the ERC-20 version of DOT on Ethereum, not the main Polkadot network.

This distinction is crucial. The Polkadot mainnet was not affected by the attack. DOT on the mainnet remains as secure as before. Only DOT tokens « bridged » to Ethereum via Hyperbridge were vulnerable. This architecture once again shows the inherent risks of cross-chain bridges: by connecting different networks, a single point of contact is created where a vulnerability on one chain can be exploited to create assets on another.

The Hyperbridge protocol had not yet officially commented on the incident at publication time. No information was provided on measures taken to protect users or recover funds. For users of the protocol, this means additional uncertainty about the security of their assets on the platform.

Although very different in scale and mechanism, the Ledger and Hyperbridge incidents share common characteristics that should concern the entire crypto community.

In both cases, attackers exploited the trust that users place in the platforms, protocols, and tools they use daily. For Ledger, it was trust in Apple’s App Store. For Hyperbridge, it was trust in a DeFi protocol operating on established cross-chain standards.

Criminals know that the average user does not systematically verify an app’s authenticity or a smart contract’s security before using it. This asymmetry between trust granted and vigilance required is the fertile ground in which these attacks flourish.

One positive point from both incidents is the community’s ability to quickly detect problems. ZachXBT detected and documented the Ledger hack within hours of its occurrence. CertiK analyzed and published the details of the Hyperbridge attack.

This community surveillance is an essential component of crypto ecosystem security. It partially compensates for the absence of a centralized regulator who could impose minimum security standards on applications and protocols.

These two mid-April 2026 incidents are part of a broader trend in which the crypto ecosystem faces increasingly sophisticated threats and fundamental security challenges simultaneously.

The year 2026 has been marked by several major hacks, the most sensational being the $290 million theft from Kelp DAO by North Korean hackers. Added to this are smaller but equally destructive incidents for individual victims. The sector is facing an industrialization of crypto fraud, with organized networks developing increasingly sophisticated tools to exploit human and technical vulnerabilities.

For regulators, these incidents raise difficult questions. Should mandatory security standards be imposed on crypto app developers? Should centralized exchanges be held liable for stolen funds following fraud they could have detected? Should hardware wallet manufacturers exercise stricter control over product distribution?

The year 2026 marks a turning point in the history of financial crime linked to cryptocurrencies. The mid-April incidents — the Ledger hack, the Hyperbridge exploit, and the $290 million mega-hack at Kelp DAO — are not isolated events. They are part of a concerning trend toward the industrialization of digital fraud in the digital asset ecosystem.

Cybersecurity experts observe a growing professionalization of criminal groups specializing in cryptocurrency theft. These organizations now have resources comparable to legitimate businesses: development teams to create malicious smart contracts, specialists in social engineering to design increasingly sophisticated scams, and money laundering networks to monetize stolen assets with complete impunity.

This industrialization manifests itself in the multiplication of « phishing kits » ready for use. These software packages, sold on the dark web, allow criminals without technical knowledge to launch large-scale phishing attacks. They include mobile app templates nearly identical to originals, website cloning tools, and fraudulent SMS distribution services. The kit used to create the fake Ledger app could have been one of these commercial products.

For legitimate users, this reality demands constant vigilance. Basic security rules are no longer sufficient. It is now essential to systematically verify URLs of visited sites, confirm the authenticity of apps before installation, and keep security software updated. Crypto is a space where individual responsibility for security is absolute — and where mistakes are often paid for in cash.

The Ledger incident is a blunt reminder that cryptocurrency security can never be fully delegated to a third party. Neither Apple, nor Ledger, nor any DeFi protocol can guarantee 100% protection of a user’s funds when basic security mistakes are made.

The golden rule remains simple: your seed phrase is the key to your funds. Never share it, never enter it on an internet-connected device, and store it physically securely. These basic gestures, repeated with every use, make the difference between users who get robbed and those who sleep peacefully.

For the sector as a whole, these incidents are a reminder that the maturity of the crypto ecosystem is not measured only by market capitalization or the number of institutional players present. It is also measured by the industry’s ability to protect its most vulnerable users.

The mid-April 2026 security incidents arrive at a pivotal regulatory moment. The European Union’s Markets in Crypto-Assets (MiCA) regulation is fully operational, establishing the world’s most comprehensive framework for digital asset oversight. Meanwhile, the UK’s Financial Conduct Authority (FCA) is racing to finalize its own crypto roadmap by June 3, 2026, seeking to create a « Safe Harbor » for crypto firms competing with European counterparts.

But what these incidents reveal is that regulation alone cannot protect users from their own mistakes. A regulatory framework can require exchanges to implement Know Your Customer (KYC) controls, mandate security audits for DeFi protocols, and impose transparency requirements on wallet service providers. What it cannot do is force Apple to improve its App Store moderation, or prevent a user from entering their seed phrase into a fraudulent application.

The fundamental tension in crypto security is that the technology is designed to be decentralized and user-controlled — but human beings are fundamentally trusting. Every year, billions of dollars are lost not to broken cryptography but to broken trust. Social engineering attacks, phishing scams, and fraudulent applications exploit this fundamental human need to trust.

Regulators are slowly waking up to this reality. The U.S. Securities and Exchange Commission (SEC) has begun issuing guidance on custody requirements for digital assets. Several jurisdictions are exploring mandatory insurance schemes for crypto custody services. The Financial Action Task Force (FATF) has updated its travel rule to cover decentralized exchanges and cross-chain bridges.

Yet the Ledger incident suggests that even these measures may be insufficient. The real security gap is not at the protocol level — where smart contracts can be audited and bridges can be reinforced — but at the application layer, where millions of users interact with crypto services through interfaces they do not fully understand.

Lire la Suite

Articles