Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    OpenAI to Robinhood: That’s not our stock, bro

    July 3, 2025

    No crypto wins in Trump’s ‘big beautiful bill,’ but market eyes liquidity boost

    July 3, 2025

    Polymarket’s $58M Zelenskyy suit bet will be decided today

    July 3, 2025
    Facebook X (Twitter) Instagram
    Thursday, July 3
    • About
    • Contact us
    • Privacy Policy
    Facebook X (Twitter) LinkedIn YouTube
    Blockchain Echo
    Banner
    • Lithosphere News Releases
    • Bitcoin
    • Crypto
    • Ethereum
    • Litecoin
    • Altcoins
    • Blockchain
    Blockchain Echo
    Home » Kaspersky warns of SparkCat malware that targets private keys on Android and iOS
    Crypto

    Kaspersky warns of SparkCat malware that targets private keys on Android and iOS

    John SmithBy John SmithFebruary 5, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    A newly discovered malware that has infiltrated popular mobile apps to steal cryptocurrency wallet private keys has been downloaded over 200,000 times.

    SparkCat, a malware targeting both Android and iOS users, spreads through malicious software development kits embedded in seemingly harmless apps, cybersecurity firm Kaspersky warned in a Feb. 4 report.

    It uses optical character recognition, a technology that reads text from images, to scan through a victim’s photo gallery, hunting for crypto wallet recovery phrases hidden in screenshots or saved notes.

    The malware has been active since March 2024, and some of these infected apps, including food delivery and AI-powered messaging apps, were available on Google Play and the App Store. It is also the first known instance of an OCR-based stealer reaching Apple’s platform.

    How does SparkCat work?

    On Android, the malware is injected via a Java-based SDK called Spark, which disguises itself as an analytics module. When an infected app is launched, Spark retrieves an encrypted configuration file from a remote GitLab repository.

    Once active, SparkCat uses Google ML Kit’s OCR tool to scan the device’s image gallery. It searches for specific keywords related to crypto wallet recovery phrases across multiple languages, including English, Chinese, Korean, Japanese, and several European languages.

    The malware then uploads the image to an attacker-controlled server, either via Amazon cloud storage or a Rust-based protocol, which adds an extra layer of complexity in tracking its activity due to encrypted data transfers and non-standard communication methods.

    On iOS, SparkCat operates through a malicious framework embedded in the infected apps, disguised under names like GZIP, googleappsdk, or stat. This framework, written in Objective-C and obfuscated with HikariLLVM, integrates with Google ML Kit to extract text from images in the gallery.

    To avoid raising suspicion, the iOS version only requests gallery access when users perform specific actions, such as opening a support chat.

    The report also warned that the “flexibility of the malware” allows it to steal other sensitive data like “content of messages or passwords that could remain on screenshots.”

    Several users at risk

    Kaspersky estimates that the malware has infected over 242,000 devices across Europe and Asia. While the exact origin remains unknown, embedded comments in the code and error messages suggest that the malware’s developers are fluent in Chinese.

    Researchers at Kaspersky urge users to avoid storing important information like seed phrases, private keys and passwords within screenshots.

    Sophisticated malware campaigns remain a consistent threat within the crypto space, and this is not the first time bad actors have managed to bypass Google and Apple’s store security measures.

    In September 2024, crypto exchange Binance flagged the “Clipper malware,” which infected devices via unofficial mobile apps and plugins and replaced the victim’s copied wallet address with one controlled by the attacker to trick them into transferring crypto to the wrong destination.

    Meanwhile, private key theft has dealt serious damage to the crypto industry, being one of the main reasons behind some of its biggest losses yet.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article5 new hotel investments in the Greek siland of Crete
    Next Article 5 new hotel investments in the Greek siland of Crete
    John Smith

    Related Posts

    No crypto wins in Trump’s ‘big beautiful bill,’ but market eyes liquidity boost

    July 3, 2025

    Senator Cynthia Lummis introduces crypto tax bill

    July 3, 2025

    Bitget Wallet cuts on-chain TRON USDT transver costs by 50%

    July 3, 2025
    Leave A Reply Cancel Reply

    Top Posts

    🐍 Lunar New Year Scratch & Win Campaign Is Live with a Grand Prize of 8,888,888 VERSE (~$1800) | by Bitcoin.com | Jan, 2025

    January 24, 2025

    Trade VERSE/USDT on KuCoin to Earn your Share of $8400 in Rewards! | by Bitcoin.com | Jan, 2025

    January 24, 2025

    Boost Your Crypto: Up to 30% Cash Back! | by Bitcoin.com | Jan, 2025

    January 24, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    About Us

    Stay updated on the world of cryptocurrency
    Your one-stop source for daily crypto news and insights
    Blockchainecho.info: Your trusted daily crypto companion

    Most Popular

    🐍 Lunar New Year Scratch & Win Campaign Is Live with a Grand Prize of 8,888,888 VERSE (~$1800) | by Bitcoin.com | Jan, 2025

    January 24, 2025

    Trade VERSE/USDT on KuCoin to Earn your Share of $8400 in Rewards! | by Bitcoin.com | Jan, 2025

    January 24, 2025

    Boost Your Crypto: Up to 30% Cash Back! | by Bitcoin.com | Jan, 2025

    January 24, 2025
    Copyright © 2025
    • Home
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.