{"id":55724,"date":"2024-03-28T11:45:13","date_gmt":"2024-03-28T11:45:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/"},"modified":"2024-03-28T11:45:13","modified_gmt":"2024-03-28T11:45:13","slug":"canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/","title":{"rendered":"Canonical cracks down on crypto cons following Snap Store scam spree"},"content":{"rendered":"<p>After multiple waves of cryptocurrency credential-stealing apps were uploaded to the Snap store, Canonical is changing its policies.<\/p>\n<p>In what&#8217;s expected to be a temporary measure, an announcement on the Snapcraft Discourse says that the Ubuntu vendor will switch to <a target=\"_blank\" href=\"https:\/\/forum.snapcraft.io\/t\/manual-review-of-all-new-snap-name-registrations\/39440\/1\" rel=\"nofollow noopener\">manual review of all new snap name registrations<\/a>. The post from <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/blog\/author\/hollyhall\" rel=\"nofollow noopener\">Holly Hall<\/a> says:<\/p>\n<p>Former Ubuntu staffer Alan &#8220;Popey&#8221; Pope has detailed some of this wave of scammy apps. Firstly, a fake &#8220;Exodus&#8221; wallet app <a target=\"_blank\" href=\"https:\/\/popey.com\/blog\/2024\/02\/exodus-bitcoin-wallet-490k-swindle\/\" rel=\"nofollow noopener\">caused one user to lose nine Bitcoins<\/a> \u2013 currently worth roughly $490,000. This scam app from <code>movementexod<\/code> was masquerading as the real Exodus wallet from Exodus Movement \u2013 a company that already offers native Debian packages alongside its Windows and Mac versions.<\/p>\n<p>A few days later, Popey published a <a target=\"_blank\" href=\"https:\/\/popey.com\/blog\/2024\/02\/exodus-bitcoin-wallet-follow-up\/\" rel=\"nofollow noopener\">follow-up post<\/a> including the response of Canonical founder and &#8220;self-appointed benevolent dictator for life&#8221; Mark Shuttleworth. You can read the <a target=\"_blank\" href=\"https:\/\/forum.snapcraft.io\/t\/should-unverified-cryptocurrency-apps-be-banned\/38919\/1\" rel=\"nofollow noopener\">discussions<\/a> of the <a target=\"_blank\" href=\"https:\/\/forum.snapcraft.io\/t\/stronger-identity-verification-for-all-publishers\/39061\" rel=\"nofollow noopener\">problem<\/a> on the Snapcraft forums. (If you are inclined to join in, note that the Snapcraft Discourse instance has its own membership system, separate from the <a target=\"_blank\" href=\"https:\/\/discourse.ubuntu.com\/\" rel=\"nofollow noopener\">official Ubuntu instance<\/a>.)<\/p>\n<p>The saga did not end there. This month, he detailed <a target=\"_blank\" href=\"https:\/\/popey.com\/blog\/2024\/03\/exodus-wallet-part-three\/\" rel=\"nofollow noopener\">ten more fake wallets<\/a> that appeared on the Snap Store, from an account called <code>digisafe00000<\/code>. When these were removed, the next day, replacements reappeared&nbsp;from <a target=\"_blank\" href=\"https:\/\/forum.snapcraft.io\/t\/stop-the-line\/39357\/1\" rel=\"nofollow noopener\">a new account called <code>codeshield0x0000<\/code><\/a>. Popey also did some digging into how they work. Worse still, these fake wallets aren&#8217;t the only ones \u2013 he has a <a target=\"_blank\" href=\"https:\/\/mastodon.social\/@popey\/112118758628030881\" rel=\"nofollow noopener\">Mastodon thread<\/a> detailing others.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Part of the&nbsp;problem is that these apps look legitimate to casual inspection because the Snap Store badges them as &#8220;safe.&#8221; Unfortunately, that just means the apps are strictly confined in a sandbox, but for the scammers&#8217; purposes, that doesn&#8217;t matter. The apps look like the real thing and use simple social engineering to extract users&#8217; credentials, which they then use to siphon off the victim&#8217;s funds. But the apps can&#8217;t touch your system, so by Snap confinement rules, they&#8217;re &#8220;safe.&#8221;<\/p>\n<p>This sort of problem is nothing new, and was <a target=\"_blank\" href=\"https:\/\/xkcd.com\/1200\/\" rel=\"nofollow noopener\">satirized by Xkcd<\/a> over a decade ago. The moves also parallel <a target=\"_blank\" href=\"https:\/\/docs.flathub.org\/blog\/improved-build-validation\/\" rel=\"nofollow noopener\">recent changes at Flathub<\/a>. This isn&#8217;t the first time that Canonical has faced problems with <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2018\/05\/14\/ubuntu_crypto_mining_apps\/\" rel=\"noopener\">cryptocurrency apps in the Snap Store<\/a> either.<\/p>\n<p><em>The Reg<\/em> FOSS desk takes an extremely jaundiced view of this. For us, all cryptocurrencies and associated apps of any form are scams, with no exceptions, as are all forms of non-fungible token trading and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.theregister.com\/2021\/12\/15\/web3_apparently_the_next_generation\/\">absolutely anything to do with &#8220;Web 3.&#8221;<\/a> The main practical use case for this pretend internet money is for criminals to extort ransomware victims and other hapless sorts. If you retain any doubt about this whatsoever, we recommend reading the excellent <a target=\"_blank\" href=\"https:\/\/davidgerard.co.uk\/blockchain\/book\/\" rel=\"nofollow noopener\">Attack of the 50 Foot Blockchain<\/a>. If one maintains this attitude, it provides complete and reliable protection from all wallet scams.<\/p>\n<h3 class=\"crosshead\">In other news<\/h3>\n<p>It&#8217;s not all bad news in Ubuntopia, though. The next LTS release, 24.04 &#8220;Noble Numbat,&#8221; has not quite reached beta stage yet, although you can <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/blog\/the-coronation-of-a-new-mascot-noble-numbat\" rel=\"nofollow noopener\">look at its wallpapers<\/a> if you like. The release of &#8220;Noble&#8221; will mark a full decade since the release of <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2014\/04\/22\/ubuntu_14_04_review\/\" rel=\"noopener\">Ubuntu 14.04 &#8220;Trusty Tahr.&#8221;<\/a> That in turn meant that &#8220;Trusty&#8221; was about to hit the end of the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/10\/26\/ubuntu_10y_kernel_life\/\" rel=\"noopener\">ten years of patches<\/a> you get with Ubuntu Pro&#8217;s <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/security\/esm\" rel=\"nofollow noopener\">Expanded Security Maintenance<\/a>.<\/p>\n<p>However, Canonical <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/\/blog\/canonical-expands-long-term-support-to-12-years-starting-with-ubuntu-14-04-lts\" rel=\"nofollow noopener\">just announced<\/a> an extension of that ten years to 12, meaning that Pro customers get another two years of critical security updates for &#8220;Trusty.&#8221; As we <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/10\/06\/ubuntu_pro_free\/\" rel=\"noopener\">reported in late 2022<\/a>, Ubuntu Pro is free for up to five machines now \u2013 so you can keep a few essential &#8220;Trusty&#8221; instances going for a little longer, if you absolutely must. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/03\/28\/canonical_snap_store_scams\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In happier news, Ubuntu Pro extended support now goes up to 12 years After multiple waves of cryptocurrency credential-stealing apps were uploaded to the Snap store, Canonical is changing its policies.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-55724","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T11:45:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Canonical cracks down on crypto cons following Snap Store scam spree\",\"datePublished\":\"2024-03-28T11:45:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/\"},\"wordCount\":612,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/\",\"name\":\"Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-03-28T11:45:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Canonical cracks down on crypto cons following Snap Store scam spree\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/","og_locale":"en_US","og_type":"article","og_title":"Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-28T11:45:13+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Canonical cracks down on crypto cons following Snap Store scam spree","datePublished":"2024-03-28T11:45:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/"},"wordCount":612,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/","url":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/","name":"Canonical cracks down on crypto cons following Snap Store scam spree 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-03-28T11:45:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZglTNqq83r9RNWGlA2YKJAAAAE0&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/canonical-cracks-down-on-crypto-cons-following-snap-store-scam-spree\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Canonical cracks down on crypto cons following Snap Store scam spree"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55724"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55724\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}