Kaspersky Uncovers SparkCat Malware Targeting Android and iOS Apps

Kaspersky Uncovers SparkCat Malware Targeting Android and iOS Apps

Key Points

  • Kaspersky identified SparkCat malware in apps on both Android and iOS, which has been active since March 2024.
  • The malware uses OCR technology to scan photos for cryptocurrency wallet recovery phrases.
  • Infected apps include ComeCome, AnyGPT, and WeTink. SparkCat has been downloaded over 242,000 times from Google Play and is also found in Apple’s App Store.
  • Users should be cautious with app permissions and avoid storing sensitive information in screenshots.

Cybersecurity researchers from Kaspersky have identified a sophisticated malware campaign, dubbed SparkCat, that has been infiltrating apps on the Google Play Store and Apple’s App Store since at least March 2024. The malware is designed to steal sensitive data by scanning screenshots for cryptocurrency wallet recovery phrases using optical character recognition (OCR) technology.

Researchers Dmitry Kalinin and Sergey Puzan shared their findings, revealing that SparkCat operates stealthily, disguising itself within seemingly legitimate applications. Some infected apps, such as the food delivery service ComeCome and AI chatbot applications AnyGPT and WeTink, are still available for download. While some affected apps appear genuine, others may have been specifically created to lure victims.

The malware exploits harmless-looking permission requests to avoid raising suspicion. Once granted access, it scans the user’s photo library for images containing sensitive text, particularly recovery phrases for cryptocurrency wallets. If found, the malware extracts the information, posing a serious risk to cryptocurrency holders.

According to Kaspersky’s analysis, SparkCat-infected apps on Google Play have been downloaded over 242,000 times. More alarmingly, the malware has also been found in Apple’s App Store apps, marking the first known instance of an OCR-based spyware infection on Apple’s platform. This revelation challenges Apple’s claim of ironclad security and is a stark reminder that no platform is entirely immune to malware threats.

While it remains unclear whether the infection stems from a supply chain attack or deliberate malicious intent from developers, the existence of such threats highlights the increasing sophistication of cybercriminal tactics. Users are advised to be cautious when granting app permissions, regularly review installed applications, and avoid storing sensitive information in easily accessible locations, such as screenshots.

EDITORIAL TEAM
EDITORIAL TEAM
TechGolly editorial team led by Al Mahmud Al Mamun. He worked as an Editor-in-Chief at a world-leading professional research Magazine. Rasel Hossain and Enamul Kabir are supporting as Managing Editor. Our team is intercorporate with technologists, researchers, and technology writers. We have substantial knowledge and background in Information Technology (IT), Artificial Intelligence (AI), and Embedded Technology.

Read More

We are highly passionate and dedicated to delivering our readers the latest information and insights into technology innovation and trends. Our mission is to help understand industry professionals and enthusiasts about the complexities of technology and the latest advancements.

Visits Count

Last month: 23565
This month: 12144 🟢Running

Company

Contact Us

Follow Us

TECHNOLOGY ARTICLES

SERVICES

COMPANY

CONTACT US

FOLLOW US