VERSE PRESS

Crypto News, Global First.

Fake Ledger App on Apple's Mac App Store Costs Philadelphia Musician More Than $424,000 in Bitcoin

A fraudulent app listed on Apple's Mac App Store drained 5.92 BTC from the wallet of Garrett Dutton, the musician known as G. Love, on April 11. On-chain investigator ZachXBT traced the stolen funds through nine transactions to deposit addresses at cryptocurrency exchange KuCoin.

Fake Ledger App on Apple's Mac App Store Costs Philadelphia Musician More Than $424,000 in Bitcoin
|

Dutton, frontman of G. Love & Special Sauce, said he was moving his Ledger hardware wallet to a new Apple computer when he searched the App Store and downloaded what appeared to be Ledger Live, the official companion app for Ledger devices.

The app he downloaded was not made by Ledger. It prompted him to enter his 24-word seed recovery phrase, which is the master key that controls full access to a crypto wallet. Once he typed it in, the attackers emptied his holdings. "I lost my retirement fund in a hack/scam when I switched my Ledger over to my new computer," Dutton posted on X. He had reportedly held the Bitcoin (approximately $71,500 per coin at the time of the theft, placing total losses at $424,175) for roughly a decade.

ZachXBT, the pseudonymous on-chain analyst who frequently traces stolen crypto publicly, identified the laundering route.

The 5.92 BTC moved across nine transactions and ended up at KuCoin deposit addresses. ZachXBT published the two primary transaction IDs: 6f5c8eb6b01774626f33527e0cb03c0d1860447... and 9ee1288f941b2c3775ebd125eefeebdc713aa1.... KuCoin has not been accused of any wrongdoing; analysts note that deposit addresses at a centralised exchange are a common laundering waypoint, as they can obscure the trail if not flagged quickly.

The funds are considered unrecoverable. Bitcoin transactions are irreversible by design.

The fake app was listed under a third-party developer account, not under Ledger SAS, the company that makes Ledger hardware wallets.

Apple has not issued any public statement about the incident.

Ledger's own guidance is unambiguous: the company will never ask for a user's recovery phrase through any channel, and the only legitimate source for the Ledger Live application is ledger.com. "Ledger and Ledger support will never ask for your 24-word recovery phrase. Never share the 24 words of your recovery phrase with anyone under any circumstances," the company states on its official phishing-campaigns status page. Ledger users have been a disproportionate target of such attacks since at least 2020, when a breach of the company's customer database exposed the contact details of hundreds of thousands of hardware wallet owners, giving attackers a ready-made list of high-value phishing targets.

This is not an isolated case. Cybersecurity firm Intego has previously documented instances where Apple approved App Store listings using the exact registered names of legitimate crypto finance products, apps that then extracted funds from trusting users. Losses in individual documented campaigns have exceeded $100,000 per incident; a separate campaign documented by crypto.news saw losses surpass $800,000 in a single operation.

A separate 2025 campaign analysed by Moonlock involved macOS malware specifically designed to replace legitimate Ledger Live installations and harvest seed phrases.

The attack on Dutton fits an established and recurring pattern. Apple's "walled garden" reputation generates precisely the trust that attackers exploit: users assume App Store listings have been vetted, and that assumption is the attack surface.

The broader threat environment is deteriorating. Chainalysis reported $17 billion in global crypto scam losses in 2025, a record figure.

Phishing losses in January 2026 alone exceeded $300 million, with impersonation scams growing roughly 1,400 percent year-over-year according to CryptoImpactHub.

A new variant of the SparkCat malware, reported in April 2026, uses optical character recognition to scan phone photo libraries for images containing wallet recovery phrases, then transmits them to attacker servers.

For users in South Asia and Africa, the risk is direct.

India has one of the largest retail crypto user bases in the world, with more than six million registered users on ZebPay alone and millions more across WazirX, CoinDCX, and global platforms. Hardware wallet adoption is increasing among Indian retail investors, but security education has not kept pace. The attack vector that caught Dutton, namely a device migration triggering a search for official software, would work equally well on a first-time Indian hardware wallet user. India lost more than 2,300 crore rupees (approximately $275 million USD) to investment scams in 2025, according to Enforcement Directorate figures, reflecting an already entrenched social engineering threat at scale. Indian users who believe they have been targeted can file a report at cybercrime.gov.in. Neighbouring markets including Pakistan, Bangladesh, and Sri Lanka face comparable or greater exposure, with growing peer-to-peer and self-custody user bases and limited institutional safety infrastructure in place.

Across Nigeria, Kenya, Ghana, and South Africa, self-custody is especially common because many users distrust or cannot access centralised platforms. Fake wallet apps have already circulated on Google Play targeting African peer-to-peer traders. The App Store attack vector represents an escalation into a channel those users may regard as more trustworthy. KuCoin's significant user base across Nigeria and East Africa also adds a compliance dimension to ZachXBT's disclosure: whether exchange-level KYC procedures in those jurisdictions can intercept laundering flows of this kind remains an open question. Victims of crypto theft in most African jurisdictions have limited formal legal recourse for recovering stolen funds, making prevention the only reliable protection.

The practical instruction is simple. Any application that requests your seed recovery phrase is malicious, regardless of where it was downloaded from. The legitimate Ledger Live app is only distributed at ledger.com/ledger-live and should list "Ledger SAS" as the developer. Users switching devices should verify the developer name in any app listing before proceeding. Apple's review process, whatever its stated standards, has repeatedly failed to stop this category of fraud. That failure carries real consequences.