Linux Snap Store Hijacked in Sophisticated Supply-Chain Attack Targeting Crypto Wallets

7 hour ago 3 sources negative

Key takeaways:

  • This supply-chain attack shifts crypto security focus from protocols to software distribution channels.
  • Investors should verify wallet authenticity beyond interface appearance, especially for Linux users.
  • The $1.45 billion in 2025 losses highlights systemic risks in developer account maintenance.

A new and sophisticated supply-chain attack is targeting Linux users by exploiting trusted applications in Canonical's Snap Store to steal cryptocurrency recovery phrases and drain funds. Blockchain security firm SlowMist issued a warning, detailing how attackers hijack long-established publisher accounts by monitoring and purchasing expired domain names associated with those accounts.

Once a target domain expires, attackers re-register it and use the linked email address to reset credentials for the Snap Store publisher account. This grants them control without raising immediate suspicion, allowing them to push malicious updates to existing, trusted applications. The compromised apps are disguised as legitimate and popular crypto wallets, including Exodus, Ledger Live, and Trust Wallet, with interfaces nearly indistinguishable from the genuine versions.

Upon launching, the malicious software connects to a remote server and prompts the user to enter their wallet recovery seed phrase. This sensitive information is instantly transmitted to the attackers' server, leading to the complete theft of funds. SlowMist's Chief Information Security Officer, 23pds, identified at least two compromised publisher domains: storewise[.]tech and vagueentertainment[.]com.

This attack highlights a significant shift in crypto-focused cyber threats, moving from protocol-level exploits to compromising trusted software distribution channels. According to data from CertiK, supply-chain attacks accounted for massive losses in 2025, with just two incidents resulting in $1.45 billion stolen. The campaign against Snap Store users is believed to have been active for approximately two years, with attackers suspected to be based in Croatia.

The incident underscores a broader industry vulnerability known as "internet rot," where developers fail to update account information across platforms. Similar domain resurrection attacks have affected GitHub, PyPI, and npm. Security experts, including former Canonical developer Alan Pope, are urging Canonical to implement safeguards such as monitoring domain expiry, requiring additional verification for dormant accounts, and enforcing mandatory two-factor authentication.

Disclaimer

The content on this website is provided for information purposes only and does not constitute investment advice, an offer, or professional consultation. Crypto assets are high-risk and volatile — you may lose all funds. Some materials may include summaries and links to third-party sources; we are not responsible for their content or accuracy. Any decisions you make are at your own risk. Coinalertnews recommends independently verifying information and consulting with a professional before making any financial decisions based on this content.