TL;DR
-
SlowMist has flagged a new Linux-focused attack abusing trusted Snap Store apps to steal crypto recovery phrases
-
Attackers hijack old developer accounts by reclaiming expired domains tied to publisher emails
-
Fake updates impersonate wallets like Exodus, Ledger Live, and Trust Wallet
-
The campaign targets long-time Linux users who trust established publishers
-
Security researchers warn the current Snap Store trust model is no longer holding up
Linux users are often seen as the more cautious crowd in crypto. Fewer downloads, more terminal commands, and a general preference for open-source tools. That’s exactly why the latest warning from blockchain security firm SlowMist has raised eyebrows.
In a recent post on X, SlowMist’s chief information security officer, known as 23pds, highlighted a new attack vector spreading through Canonical’s Snap Store. The issue isn’t a flashy zero-day or a kernel exploit. It’s something more uncomfortable. Attackers are abusing trust specifically, trust built over years by legitimate Snap Store publishers.
The attack hinges on expired domains. Some long-standing Snap Store developers originally registered their accounts using email addresses tied to custom domains. Over time, those domains expired and were abandoned. Threat actors noticed. By re-registering those expired domains, attackers were able to regain control of the associated email servers, reset developer account passwords, and quietly take over Snap Store listings that had existed for years.
From the user’s perspective, nothing looked wrong. The app name was familiar. The publisher had history. The update came through official channels. That’s where the damage starts.
How fake wallet updates steal everything
Once attackers gain access to a trusted publisher account, they push malicious updates through the Snap Store. These compromised packages are designed to impersonate well-known crypto wallets, including Exodus, Ledger Live, and Trust Wallet. The interfaces closely mirror the real applications, making detection difficult even for experienced users. After installation or update, the malicious app prompts users to enter their wallet recovery seed phrase. Some present it as a routine security check. Others claim a sync issue or account verification problem.
The result is the same. Once the recovery phrase is entered, it is exfiltrated to the attacker. Funds can then be drained silently, often without immediate signs of compromise. There’s no phishing link. No sketchy download site. Everything happens inside what appears to be a legitimate Linux app ecosystem. According to reporting from Risky Business, at least two Snap Store developer accounts have already been hijacked using this method. The compromised accounts were originally registered using email addresses tied to the domains storewise.tech and vagueentertainment.com.
This technique is often referred to as a domain resurrection attack. It’s not new in the broader security world, but its appearance inside the Snap Store ecosystem raises serious questions about how trust signals are handled for package distribution.
A campaign that didn’t start yesterday
This isn’t a one-off incident. Linux expert and former Canonical developer Alan Pope says the same group has been targeting Snap Store users for years, with a clear focus on cryptocurrency holders. The attackers have repeatedly published malicious crypto-related packages using different strategies. Some relied on typosquatted names that closely resemble legitimate wallets. Others distributed harmless-looking apps that later turned malicious during an update, catching users off guard. Based on observed behavior and infrastructure, Pope believes the group behind this campaign is located in Croatia. More importantly, he warns that the domain takeover method strikes at one of the few remaining trust anchors users rely on.
That assessment cuts to the core of the issue. Longevity has always implied safety. A package that’s been around for years feels safer than something uploaded last week. This attack flips that assumption on its head.
Why this matters beyond Linux
At first glance, this may look like a niche Linux problem. In reality, it touches a much larger nerve in crypto security. Seed phrases remain the single point of failure for most self-custody users. Once exposed, there is no recovery process, no support ticket, and no rollback. Attacks that capture recovery phrases don’t need to break cryptography or compromise blockchains. They only need to convince a user to trust the wrong interface once.
What makes this campaign particularly dangerous is how ordinary it looks. No malware warnings or No browser pop-ups. Just a routine app update from a familiar source. It also highlights a broader issue with software distribution in crypto-adjacent environments. As more users rely on app stores, package managers, and automated updates, attackers are shifting away from obvious scams toward infrastructure-level trust abuse.
Closing Thoughts
SlowMist’s warning isn’t just about one store or one operating system. It’s a reminder that security assumptions age faster than software. For now, Linux users are being advised to double-check wallet updates, avoid entering recovery phrases into desktop apps unless absolutely necessary, and treat any prompt for seed phrases as a red flag regardless of how trusted the source appears.
READ MORE: COTI Earn Season 3 Explained: Rewards, TPS, Missions, and How It Works
