Loading cryptocurrency prices...

Dangerous ‘SparkCat’ Malware Discovered in Official App Stores, Targets Crypto Users

Security Flaw in DeepSeek AI Tool Leaves System Vulnerable to Attacks, Report Finds

  • Cryptocurrency wallet-targeting Malware discovered on iOS App Store for the first time, affecting multiple applications.
  • SparkCat malware campaign has infected apps with over 242,000 combined downloads on Google Play Store.
  • Malicious apps use OCR technology to scan device galleries for cryptocurrency wallet recovery phrases.
  • Affected applications include legitimate-appearing food delivery services and AI messaging apps.
  • Apple‘s App Store review process shows vulnerability despite claimed security measures.

A sophisticated malware campaign dubbed “SparkCat” has breached both Apple‘s App Store and Google Play Store security measures, targeting cryptocurrency users’ wallet recovery phrases through seemingly legitimate applications, security researchers at Kaspersky revealed today.

- Advertisement -

The campaign, active since March 2024, represents the first documented case of crypto-stealing malware successfully infiltrating Apple‘s typically stringent App Store ecosystem. Among the compromised applications, an Indonesian food delivery app called ComeCome accumulated over 10,000 downloads before detection.

The malware operates through a concealed SDK framework that employs optical character recognition (OCR) technology to scan users’ photo galleries for specific keywords related to cryptocurrency wallets. “What makes this Trojan particularly dangerous is that there’s no indication of a malicious implant hidden within the app,” Kaspersky researchers noted in their detailed analysis.

On the Google Play Store front, the impact appears more severe, with infected applications amassing over 242,000 downloads collectively. This breach occurs despite Google‘s recent efforts to enhance security, which resulted in blocking more than 2 million risky applications in 2024 alone.

Security experts recommend immediate removal of affected applications and advise against storing sensitive information in device galleries. Instead, users should employ secure password managers for storing critical credentials. For comprehensive device protection, experts suggest installing reputable antivirus software.

- Advertisement -

The emergence of SparkCat malware highlights an evolving threat landscape where cybercriminals increasingly target cryptocurrency assets through sophisticated social engineering and malware distribution techniques. Users should exercise heightened caution when downloading applications, particularly those requesting extensive device permissions or access to sensitive data.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Chainlink (LINK) Eyes 205% ROI by 2026 After 21% Price Slide

ChainLink (LINK) declined 21% in the past month, dropping below $19.The decrease is linked...

S&P Global to Deliver Stablecoin Ratings On-Chain via Chainlink

S&P Global Ratings will offer Stablecoin Stability Assessments on-chain through a partnership with ChainLink. These...

Crypto Market Hit by Record $19B Liquidation, $65B Interest Wiped Out

A record $19 billion in crypto assets were liquidated during the market crash on...

Morgan Stanley Turns Bearish, Sees S&P 500 Drop Amid Tensions

Morgan Stanley shifts to a bearish outlook on the S&P 500 following last week’s...

Expert: Musk’s New $1T Pay Plan Focuses on Real Value for Tesla

Tesla proposed a new compensation plan for Elon Musk, tied solely to achieving set...
- Advertisement -

Must Read

5 Best Crypto Jobs Sites To Land Your Next Six Figure Job

The cryptocurrency and blockchain job market has exploded. With new blockchain start-ups and projects being founded at a blistering pace, the demand for workers...