Check Point Research has uncovered how a crypto drainer app, disguised as a legitimate tool, stole over $70,000 in cryptocurrency before being removed from Google Play.

A sophisticated crypto-drainer app masquerading as the popular WalletConnect protocol infiltrated Google Play, exploiting advanced evasion techniques and social engineering tactics to steal cryptocurrency from unsuspecting users. The app remained available for nearly five months, during which it was downloaded over 10,000 times.
The attackers behind the fake WalletConnect app preyed on the trust users place in the legitimate WalletConnect protocol, a tool designed to securely connect cryptocurrency wallets with decentralized applications (dApps). Leveraging this trusted name, the malicious app posed as a simple solution to the sometimes complex process of linking crypto wallets to dApps.
How the Attack Worked
Once installed, the app directed users to connect their cryptocurrency wallets, under the guise of facilitating Web3 transactions. However, instead of establishing secure connections, the app redirected users to malicious websites. These websites tricked users into authorizing multiple transactions, enabling the attackers to drain valuable digital assets.
Check Point Research revealed that the app siphoned off tokens from more than 150 wallets, with stolen funds totaling over $70,000. The app’s design allowed it to target and steal high-value tokens first, followed by less expensive assets, thereby maximizing the amount stolen from each user.
Fake Reviews and Evasion Techniques
The malicious app evaded detection for an extended period by using several technical tricks, including redirects and user-agent checking. In addition, the attackers deviously flooded the app’s page with fake positive reviews to mask the negative feedback from victims. This manipulation allowed the app to remain unnoticed, climbing search rankings and further deceiving new users.
Check Point’s analysis revealed that the majority of the stolen funds remain in the attackers’ wallets, with few outgoing transactions to indicate how the money is being laundered or spent.
Google has since removed the app, but the incident highlights the risks posed by malicious applications exploiting trusted names and legitimate protocols. This case underscores the need for heightened vigilance when connecting cryptocurrency wallets to third-party apps, particularly those downloaded from unofficial sources.
Conclusion
The malicious WalletConnect app’s success in siphoning funds without detection serves as a cautionary tale about the dangers lurking in the crypto space. By using advanced social engineering and evasion techniques, attackers were able to steal significant sums from unwitting users, further demonstrating the need for more stringent security measures in decentralized finance.
Baburajan Kizhakedath