spot_img

Date:

Share:

Kaspersky discovers new SparkCat variant bypassing App Store and Google Play security

 Kaspersky has identified a new variant of the SparkCat Trojan in the App Store and in Google Play — a year after the crypto-stealing malware was first discovered and removed from both platforms. The Trojan hides inside legitimate-looking apps and scans users’ photo galleries for cryptocurrency wallet recovery phrases.

The new version of SparkCat is distributed through infected legitimate apps — messengers designed for enterprise communication and a food delivery app. Kaspersky experts found two infected apps on the App Store and one on Google Play, from which the malicious code has since been removed. Kaspersky telemetry shows that the apps infected with SparkCat are also distributed through third-party sources. A few of these web pages are mimicking the App Store if opened from an iPhone.

The updated variant of the Trojan for Android scans image galleries on the compromised devices for screenshots containing specific keywords in Japanese, Korean and Chinese, leading Kaspersky experts to assess that this campaign primarily targets cryptocurrency assets of users in Asia. The iOS variant, however, takes a different approach as it scans for cryptocurrency wallet mnemonic phrases, which are in English. This makes the iOS variant potentially broader in reach, as it can affect users regardless of their region.

The updated SparkCat version for Android features multiple obfuscation layers compared to previous versions, including code virtualization and cross-platform programming language usage — techniques that are rare for mobile malware.

Kaspersky has reported known malicious applications to Google and Apple.

The infected version of the app for iOS.

“The updated variant of SparkCat requests access to view photos in a user’s smartphone gallery in certain scenarios — just like the very first version of the Trojan. It analyses the text in stored images using an optical character recognition module. If the stealer finds relevant keywords, it sends the image to the attackers. Considering the similarities of the current sample and the previous one, we believe that the developers of the new version of malware are the same. This campaign again underscores the importance of using security solutions for smartphones to stay protected against a broad range of cyberthreats,” said Sergey Puzan, cybersecurity expert at Kaspersky.

“The SparkCat malware is an evolving mobile threat. Threat actors behind it constantly raise the complexity of the anti-analysis techniques allowing it to bypass the review process of the official app stores. Moreover, methods used by the SparkCat developers, such as code virtualization and cross-platform programming language usage, are rare for mobile malware. This demonstrates the high skill of the threat actors,” added Dmitry Kalinin, cybersecurity expert at Kaspersky.

To avoid becoming a victim of this malware, Kaspersky recommends the following safety measures:

  • Use reliable cybersecurity software, like Kaspersky for Mobile — it can protect your data on smartphones from cyberattacks. Kaspersky for Android will prevent installation of the malware, while Kaspersky for iOS, due to the architectural characteristics of Apple’s OS, prevents an attempt to connect to the attackers’ command server and displays a warning to users.
  • Avoid storing screenshots containing sensitive information in your gallery, especially cryptocurrency wallet seed phrases. Such sensitive information as well as screenshots of important documents should be stored in specialised applications such as Kaspersky Password Manager.
  • Be careful even downloading apps from official stores, as it is not always risk-free.

spot_img
spot_img

━ More like this

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...

High-severity incidents at a minimum: Kaspersky experts reveal a steady decline over the years

According to the ‘Anatomy of a Cyber World: Global Report by Kaspersky Security Services’, there has been a noticeable decline in the percentage of high-severity incidents...

Kaspersky uncovers CrystalX RAT which steals data and mocks its victims

The new remote access trojan (RAT) is capable not only of stealing information and fully spying on its victims, but also of making fun...
spot_img