Description

SeedSnatcher is a newly identified Android malware strain designed specifically to target cryptocurrency users. Distributed mainly through social media and messaging platforms, the malware is disguised as a harmless-looking APK that users often install believing it to be a legitimate crypto-related application. Once installed, SeedSnatcher focuses on stealing wallet recovery seed phrases the most sensitive component of any crypto wallet and enabling remote control over the infected device. The attackers aim for complete and irreversible wallet takeover by harvesting valid mnemonic phrases and exfiltrating personal data. Technically, SeedSnatcher employs a layered infection process to avoid suspicion and detection. The app initially requests minimal permissions, such as SMS access, giving users a false sense of security. After installation, it escalates its privileges by requesting access to storage, contacts, call logs, overlay permissions, and other sensitive features. This escalation is a crucial step, enabling the malware to read private data and display deceptive screens over legitimate applications. The malware uses dynamic class loading and WebView-based content injection to hide its malicious components. It maintains a continuous connection to a remote command-and-control server through a persistent WebSocket channel. Through coded commands delivered via this channel, attackers can harvest device information, exfiltrate contacts and SMS (including OTP and 2FA codes), initiate calls or USSD requests, and conduct comprehensive device profiling. A standout capability of SeedSnatcher is its overlay-based phishing mechanism. When the user opens a genuine crypto wallet app, the malware can instantly display a fake wallet-import interface that mimics the real one. This deceptive overlay captures seed phrases directly from the user. To maximize success, SeedSnatcher validates the entered words against the official BIP-39 dictionary, ensuring only syntactically valid seed phrases are exfiltrated.