Fake crypto wallet apps and browser extensions are one of the most effective and consistently damaging scam vectors in the crypto space. They look identical to the real thing. They appear in legitimate app stores and browser extension marketplaces. They have reviews, download counts, and professional interfaces. And the moment you set up a wallet using one, your seed phrase, private keys, and every asset you deposit are immediately compromised.
This is not a rare or obscure threat. Fake wallet apps and extensions have stolen tens of millions of dollars from crypto investors at every experience level. Understanding exactly how they operate, how to identify them, and how to verify any wallet software before use is a fundamental security requirement.
The mechanics of fake wallet apps and extensions vary, but the outcome is consistent: the attacker gains access to your private keys or seed phrase and drains your assets.
Fake seed phrase capture. The most common mechanism is a fake wallet app or extension that generates a seed phrase during setup that appears to be randomly generated but is actually selected from a pre-generated list controlled by the attacker. The seed phrase is simultaneously transmitted to the attacker’s server. You believe you have a secure, private wallet. The attacker has the keys to everything you deposit from the moment you set it up.
Seed phrase interception during import. Some fake wallets function correctly as wallets but intercept and transmit your seed phrase when you import an existing wallet. Investors who download a fake wallet app to restore an existing wallet using their seed phrase hand that seed phrase directly to the attacker.
Transaction manipulation. Some fake wallet extensions sit between you and legitimate DeFi protocols and manipulate transaction details before you sign them. The address displayed in the confirmation screen is replaced with the attacker’s address. What you believe you’re signing and what you’re actually signing are different.
Credential harvesting. Some fake extensions are designed to harvest login credentials for centralised exchanges and other crypto platforms by injecting fake login forms or capturing keystrokes on exchange websites.
In all cases, the attack is silent and immediate. By the time you realise something is wrong, your assets are gone.
Understanding where fake wallet software appears helps you know where to apply the most scrutiny.
Official app stores. Google Play Store and the Apple App Store are the most trusted sources of mobile applications, but neither provides a guarantee that every listed application is legitimate. Fake wallet apps have appeared on both platforms, sometimes accumulating thousands of downloads and hundreds of positive reviews before being identified and removed. Attackers use review manipulation, bot accounts, and misleading listings to appear credible within app store search results.
Browser extension marketplaces. The Chrome Web Store and Firefox Add-ons marketplace have both hosted fake wallet extensions, including fake versions of MetaMask and other major wallets. Extension listings can closely mimic the appearance of legitimate listings with copied descriptions, screenshots, and fabricated reviews.
Phishing sites. As covered in our phishing scams resource, fake websites impersonating legitimate wallet providers distribute malicious downloads directly. A search for “MetaMask download” or “Ledger Live download” can surface sponsored search results or SEO-optimised fake sites that appear above the legitimate source in results.
Social media and messaging platforms. Fake wallet apps are distributed through links shared on Twitter, Telegram, Discord, and other platforms, often by impersonation accounts posing as official support or by community members who have themselves been compromised. Our resource on phishing scams in crypto covers the social engineering tactics used to distribute malicious links in these environments.
Third-party download sites. Websites offering “mirror downloads” or “faster download links” for popular wallet software are a consistent source of malware-bundled or outright fake wallet installers. There is never a legitimate reason to download wallet software from a third-party site.
Several signals help identify fake wallet apps and extensions, though none is individually definitive. The combination of multiple signals is what builds or destroys confidence in a wallet’s legitimacy.
Developer identity. Every legitimate app store listing displays the developer name and, in many cases, a link to the developer’s website. Verify that the developer name exactly matches the legitimate developer. For MetaMask, the legitimate developer is MetaMask. For Ledger Live, the legitimate developer is Ledger SAS. For Trezor Suite, it is SatoshiLabs. Any variation, a slightly different name, an added word, a different company entity, is a red flag. Search for the developer name independently and confirm it matches what is publicly documented on the official website.
Download source verification. The developer’s official website should always be the starting point for finding legitimate download links. Navigate to the official website directly, not through a search result or a link, and follow the download link from there. The official website for MetaMask is metamask.io. For Ledger, it is ledger.com. For Trezor, it is trezor.io. For SafePal, it is safepal.com. Always navigate there directly.
Review quality and patterns. App store reviews for fake wallets are frequently manipulated with bot accounts posting generic five-star reviews. Look for reviews that discuss specific features, report problems, or provide detailed feedback rather than generic praise. A pattern of short, vague, five-star reviews from accounts with no review history is a red flag. Also look at the distribution of ratings: legitimate popular apps typically have a broad distribution of ratings including critical reviews, not a uniform concentration at five stars.
Download count relative to the app’s claimed popularity. A fake version of one of the most downloaded wallet apps in the world should not have 500 downloads. If the download count seems low relative to what you’d expect for the claimed product, that discrepancy is worth investigating.
Permissions requested. Be suspicious of wallet apps or extensions that request permissions beyond what is needed for their stated function. A wallet app has no legitimate reason to request access to your contacts, camera, microphone, or SMS messages. A browser extension has no legitimate reason to request permission to read and modify data on all websites you visit beyond what its stated function requires.
Publication date and update history. Legitimate wallet apps have publication dates consistent with the product’s known history and a track record of regular updates. A fake app created recently to impersonate an established product will have a recent publication date and no update history. Check when the app was first published and compare it to when the legitimate product was actually released.
Hardware wallets like Ledger, Trezor, Coldcard, Bitbox, SafePal, and Tangem require companion applications on your computer or phone to interact with the device. These companion apps are a specific target for fake software distribution because investors setting up a new hardware wallet are often searching for the companion app for the first time and may not know exactly where to find the legitimate version.
The risk with a fake companion app for a hardware wallet is that it can instruct you to enter your seed phrase during setup, claiming it’s needed for device initialisation. A legitimate hardware wallet companion app never asks for your seed phrase. The seed phrase is generated on the device itself and displayed only on the device screen, never on your computer.
Always download hardware wallet companion apps exclusively from the manufacturer’s official website, navigated to directly. Our setup guides for each hardware wallet include the correct official download sources and walk through the setup process step by step, specifically to help investors avoid this category of attack.
Browser extensions deserve specific attention because the extension environment carries higher inherent risk than mobile apps in several ways.
Extensions run with elevated privileges within your browser and can interact with web pages you visit, including exchange login pages and DeFi protocol interfaces. A malicious extension has a significantly broader attack surface than a mobile app that operates in a sandboxed environment.
The Chrome Web Store in particular has a history of hosting malicious extensions because its review process has historically been less rigorous than the Apple App Store. Extensions are also updateable after installation, meaning a legitimate extension that you installed correctly can later push a malicious update if the developer account is compromised or if the extension is acquired by a malicious party after its initial publication.
Several practical measures reduce browser extension risk specifically. Install only the minimum necessary extensions and audit your installed extensions regularly, removing any you don’t actively use. As covered in our advanced crypto security resource, a dedicated browser profile used exclusively for crypto activity with only the essential extensions installed significantly reduces your extension attack surface. Check extension permissions carefully before installing and be suspicious of any extension requesting broad permissions beyond what its stated function requires.
For MetaMask specifically, installing only from metamask.io and verifying the extension ID against the official published ID is the correct verification process. The legitimate MetaMask Chrome extension ID is publicly documented on the MetaMask website.
The correct process for downloading and verifying any wallet software follows a consistent pattern regardless of the specific wallet involved.
Navigate directly to the official website of the wallet provider using a URL you have manually typed or that comes from a trusted, independently verified source. Do not use search engine results, email links, or social media links as your starting point.
From the official website, find the download link for the specific platform you need, whether that’s mobile, desktop, or browser extension. Follow that link directly to the app store or extension marketplace.
In the app store or marketplace, verify the developer name exactly matches the legitimate developer as documented on the official website. Check the publication date, download count, and review distribution for consistency with a legitimate, established product.
After downloading, verify the developer name again in your installed applications or extensions list. For desktop applications, verify the digital signature of the installer if the developer publishes signing certificates, which most reputable wallet providers do.
Never proceed with setup if anything in this process raises a concern. Delete the application, clear your browser, and start the process again from the official website.
Building clarity on what legitimate wallet software never does is as important as knowing what fake wallets do.
A legitimate wallet app or extension will never ask for your seed phrase during initial setup. The seed phrase is generated and displayed for you to record, not entered by you.
A legitimate hardware wallet companion app will never ask you to enter your seed phrase on your computer or phone. Seed phrase entry for hardware wallet recovery happens exclusively on the device itself.
A legitimate wallet will never contact you proactively through email, social media, or messaging platforms to inform you of a security issue requiring your seed phrase or credentials. As covered in our how to secure your MetaMask wallet resource, MetaMask has no support team that will contact you. Neither does Ledger, Trezor, or any other reputable wallet provider.
A legitimate wallet will never require you to pay a fee, send crypto, or complete a transaction to “unlock” or “verify” your wallet. Any such request is a scam.
If you suspect you’ve set up a wallet using a fake app or extension, act immediately.
Do not deposit any further funds into the compromised wallet. If assets are already in it, transfer them to a new wallet generated from a legitimate source on a clean device as fast as possible. Assume that any seed phrase generated by or entered into a fake wallet is compromised and will never be secure again. Generate a completely new seed phrase using verified legitimate software.
Delete the fake application from your device entirely and run a full malware scan using reputable antivirus software before using the device for any further crypto activity. In severe cases where the device itself may be compromised, a clean operating system reinstall is the only reliable remediation.
Speed matters here. Attackers monitoring compromised wallets typically drain them as soon as assets are deposited. If you suspect compromise, every minute counts.
Fake wallet apps and browser extensions are distributed through official app stores, browser marketplaces, phishing sites, and social media. They work by capturing or transmitting your seed phrase or private keys from the moment of setup. Always download wallet software exclusively from the official developer website, navigated to directly. Verify the developer name, publication date, permissions, and download source before installing anything. Legitimate wallets never ask for your seed phrase during setup, never contact you proactively with security requests, and never require payment to unlock or verify your wallet. If you suspect you’ve used a fake wallet, move assets immediately and generate a new seed phrase from a verified legitimate source.
The attack is simple. The protection is equally simple: always go to the source directly, always verify before you install, and never enter your seed phrase into anything you didn’t generate it on.
For everyday investors building strong security habits from the ground up, our Runite Tier Membership provides the step-by-step guidance and security education to navigate the crypto space safely. For serious investors who want a comprehensive personalised security framework and direct specialist support, our Black Emerald and Obsidian Tier Members receive exactly that. Find out more at shepleycapital.com/membership.
WRITTEN & REVIEWED BY Chris Shepley
UPDATED: MARCH 2026