Malicious actors are doing everything at their disposal to undermine modern IT infrastructure. Some are motivated by the usual monetary gains, while others have more sinister intents.
Canonical's Snap Store is the latest in line, with the platform facing increasingly sophisticated attacks, and a recent development makes things look particularly bleak.
Before we go ahead, keep in mind that the backend tech for the Snap Store is proprietary, and many people tend to confuse this with Snaps themselves being some mysterious concoction (read: closed-source).
The Snap Store is Due For a Clean-Up

Alan Pope, a former Canonical employee who worked there from 2011 to 2021, has been documenting this mess since early 2024, where fake cryptocurrency wallet applications have been flooding the store.
Such scams have led to confirmed losses, including one case where $490,000 was stolen from a single victim.
This goes without saying, but these aren't just annoying adware-ridden apps. They are outright thieving tools. The scammers publish malware disguised as legitimate crypto wallets like Exodus, Trust Wallet, or Ledger. When users install these fake apps and enter their wallet recovery phrases, the credentials get delivered straight to the criminals.
The tactics have evolved over time. Initially, scammers just published authentic-looking apps with plausible screenshots. When Canonical added text filters, they started using Unicode lookalike characters from other alphabets to bypass detection.
Then arrived the bait-and-switch approach: publish something harmless like a game under a random name, get it approved, then push a second version containing the harmful malware.
But their latest tactic is utter mischief and absolute deceit. 😑
The scammers have started monitoring the Snap Store for applications whose publishers' domain registrations have expired. When a domain, let's say coolproject.tech, is abandoned, these wannabe vultures swoop in to register it in their name and trigger a password reset on the Snap Store account.
By doing this, they gain control of a legitimate, trusted publisher account with an established history.
Alan was reminded of this long-standing issue when he started monitoring the Snap Store using his SnapScope tool. Though he remains sympathetic to the people working at Canonical and is not angry at the engineers. But he does want the problem fixed.
What Can Be Done?
Well, much of the matter would've been tackled if domain names were bound to their original owners (with the option to transfer them to others) and weren't left to the bandits once some time limit was up. But that isn't feasible in today's time.
The next best and obvious bet would be for Canonical to step up their game and do something about this issue. They already have a manual review process for new Snap name registrations, but that isn't sufficient to handle this particular loophole those sneaky scammers are using, is it?
If they don't do anything about this, then they are knowingly endangering their users, both private and commercial, you know. 🙃
Suggested Read 📖: Check Your Snap Packages for Vulnerabilities

