Home
/
Education resources
/
Security practices
/

Apple's $99 protection plan vs. $9.5 m loss from fake ledger app

Apple Charges $99 a Year for Safety | Fake Ledger App Sweeps Up $9.5 Million

By

TomΓ‘s GuzmΓ‘n

Apr 25, 2026, 08:54 AM

3 minutes estimated to read

A split image showing an Apple logo alongside a graphic of a fake ledger app with money being stolen, highlighting online safety concerns.

A recent controversy has erupted as a fake Ledger app, appearing in Apple’s App Store, reportedly drained $9.5 million within just a week. This raises critical questions about Apple’s app review process and user safety in the crypto space.

Problematic Approval Process

The app was live from April 7 to April 13, and many users are fuming over how such a malicious application could remain available for that long. One frustrated individual stated, "What disgusts me the most is the app was up for 7 days Surely the people who lost their money noticed and reported it."

This incident has ignited discussions about negligence in approving apps, particularly those involving financial transactions. A user noted, "It’s negligence," highlighting the gap between promised safety and actual user experience.

Users Demand Accountability

The sentiment among many in the user community is clear: they are holding Apple accountable. Comments emphasize the expectation that Apple’s vetting process should have caught the fraudulent app. As one commenter pointed out, "Apple should pay back the stolen funds," reflecting the demand for accountability.

Despite these claims, some argue that developers often exploit loopholes in the approval process. A user remembered their recent experience, explaining that many developers submit a basic version of an app to gain approval and add actual features later. "They just spend all their time on fucking your wallet," lamented another user, criticizing Apple for focusing on profits rather than user safety.

Key Concerns Raised

Many suggest that the app review process isn't as stringent as advertised, putting both users and Apple’s reputation at risk. The following themes emerged from user comments:

  • πŸ“‰ Fluid Approval Processes: Many believe that the vetting process allows dangerous apps to slip through.

  • ⚠️ User Responsibility: Some users stress the importance of verifying software independently instead of relying solely on app stores.

  • πŸ” Trust in Safety: The incident casts doubt on the notion that Apple's ecosystem is infallible, as one critical comment noted, "'Apple is safe' is no longer a credible argument for hardware wallet users."

Key Takeaways

  • πŸ”’ "9.5 million is not equal to 99 dollars." - Comment highlights the monetary loss against Apple’s annual fee.

  • ⚑ Users criticize the efficacy of Apple’s review process regarding security.

  • 🌐 "This sets a dangerous precedent" regarding the credibility of app approval.

As this story develops, it raises significant concerns about user safety in the crypto world and the responsibilities of major platforms like Apple to protect their consumers.

Possible Outcomes Unfolding

There’s a strong chance that Apple will face mounting pressure to revise its app review process in light of this incident. Experts estimate around a 70% probability that the company will implement stricter vetting measures to enhance user safety and protect its reputation. Following public outcry, it’s feasible that Apple may introduce more transparency in how apps are approved, perhaps even providing users with clearer guidelines on app safety moving forward. Moreover, we might see an uptick in lawsuits from affected users seeking restitution, pushing Apple to take swift action to regain consumer trust, especially in a market heavily intertwined with financial technology.

Echoes from the Software Era

This situation parallels the early days of antivirus software, where novice users often unknowingly invited malware into their systems, leaving tech companies scrambling to improve their defenses. Just as the rise of rogue applications forced software companies to reinforce their security protocols, Apple now faces a similar inflection point. Like the transition from basic antivirus setups to comprehensive cybersecurity solutions, we might see Apple evolving not just its vetting processes but also redefining how it approaches user education in an increasingly complex digital landscape.