Ghostboard pixel

Ubuntu's Snap Store is Under Siege from Scammers, and The Gates are Open

After years of crypto wallet theft, scammers have escalated to domain takeovers.
Warp Terminal

Malicious actors are doing everything at their disposal to undermine modern IT infrastructure. Some are motivated by the usual monetary gains, while others have more sinister intents.

Canonical's Snap Store is the latest in line, with the platform facing increasingly sophisticated attacks, and a recent development makes things look particularly bleak.

Before we go ahead, keep in mind that the backend tech for the Snap Store is proprietary, and many people tend to confuse this with Snaps themselves being some mysterious concoction (read: closed-source).

The Snap Store is Due For a Clean-Up

the picture shows the search results for the term "crypto wallet" on the snap store, there are many results shown, with only two of those being Canonical-verified additions
📋
The picture above shows the search results when searching for the term "Crypto Wallet." Imagine how easy it would be to install a malicious one by mistake.

Alan Pope, a former Canonical employee who worked there from 2011 to 2021, has been documenting this mess since early 2024, where fake cryptocurrency wallet applications have been flooding the store.

Such scams have led to confirmed losses, including one case where $490,000 was stolen from a single victim.

This goes without saying, but these aren't just annoying adware-ridden apps. They are outright thieving tools. The scammers publish malware disguised as legitimate crypto wallets like Exodus, Trust Wallet, or Ledger. When users install these fake apps and enter their wallet recovery phrases, the credentials get delivered straight to the criminals.

The tactics have evolved over time. Initially, scammers just published authentic-looking apps with plausible screenshots. When Canonical added text filters, they started using Unicode lookalike characters from other alphabets to bypass detection.

Then arrived the bait-and-switch approach: publish something harmless like a game under a random name, get it approved, then push a second version containing the harmful malware.

But their latest tactic is utter mischief and absolute deceit. 😑

The scammers have started monitoring the Snap Store for applications whose publishers' domain registrations have expired. When a domain, let's say coolproject.tech, is abandoned, these wannabe vultures swoop in to register it in their name and trigger a password reset on the Snap Store account.

By doing this, they gain control of a legitimate, trusted publisher account with an established history.

Alan was reminded of this long-standing issue when he started monitoring the Snap Store using his SnapScope tool. Though he remains sympathetic to the people working at Canonical and is not angry at the engineers. But he does want the problem fixed.

What Can Be Done?

Well, much of the matter would've been tackled if domain names were bound to their original owners (with the option to transfer them to others) and weren't left to the bandits once some time limit was up. But that isn't feasible in today's time.

The next best and obvious bet would be for Canonical to step up their game and do something about this issue. They already have a manual review process for new Snap name registrations, but that isn't sufficient to handle this particular loophole those sneaky scammers are using, is it?

If they don't do anything about this, then they are knowingly endangering their users, both private and commercial, you know. 🙃


Suggested Read 📖: Check Your Snap Packages for Vulnerabilities

Check Your Snap Packages for Vulnerabilities With This Vibe-Coded Tool
Snapscope makes it easy to scan any Snap package for security issues.
About the author
Sourav Rudra

Sourav Rudra

A nerd with a passion for open source software, custom PC builds, motorsports, and exploring the endless possibilities of this world.

Could not load content

Become a Better Linux User

With the FOSS Weekly Newsletter, you learn useful Linux tips, discover applications, explore new distros and stay updated with the latest from Linux world

itsfoss happy penguin

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to It's FOSS.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.