Tinder and Bumble users targeted by major iOS crypto scam

An illustration of Bitcoin with a financial value graph
(Image credit: eToro)

Cybersecurity researchers have shared insights into a cryptocurrency trading scam that attacks iPhone users through popular dating platforms such as Bumble and Tinder.

Named CryptRom by researchers at Sophos, the scam first targeted people in Asia, and is now attacking users in the US and Europe as well.

A Bitcoin wallet belonging to the attackers reveals that the threat actors have minted nearly $1.4 million in cryptos from the scam.

TechRadar needs yo...

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> <a href="https://project.tolunastart.com/tqsruntime/main?surveyData=LFFFsT0HpgsyUe0tTFumBJohXK8Sedt0ARpsCF4DRGR+oCoVbvd+2+d8+UNIIx4L" data-link-merchant="project.tolunastart.com"" target="_blank">Click here to start the survey in a new window <<

“The CryptoRom scam relies heavily on social engineering at almost every stage,” said Jagadeesh Chandraiah, senior threat researcher at Sophos, adding that the novel scam has the potential of doing a lot more damage than just stealing cryptos.

Gateway to scams

Unraveling the scam, Sophos says the threat actors begin by posting fake profiles on legitimate dating sites to lure in victims. Once baited, the victims are then persuaded to install and invest in a fake cryptocurrency trading app. 

“At first, the returns look very good but if the victim asks for their money back or tries to access the funds, they are refused and the money is lost,” the researchers share.

The threats however don’t just end with the lost cryptos. Sophos notes that the threat actors use Apple’s enterprise signature mechanism to install apps directly on iOS devices circumventing the App Store.

Enterprise signature is designed for use by iOS developers to enable app developers to test iOS apps before submitting them to the official Apple App Store for review and approval. 

“Until recently, the criminal operators mainly distributed the fake crypto apps through fake websites that resemble a trusted bank or the Apple App Store. The addition of the iOS enterprise developer system introduces further risk for victims because they could be handing the attackers the rights to their device and the ability to steal their personal data,” said Jagadeesh Chandraiah, senior threat researcher at Sophos.

Sophos believes the threat actors use the fake crypto trading app to gain remote management control over the devices of their victims, which exposes them to all kinds of malicious campaigns.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.