Crypto-Stealing Malware Found in Apps on Apple and Google Stores
The SparkCat malware uses OCR technology to extract sensitive data from screenshots, targeting crypto wallet recovery phrases.
- Security researchers at Kaspersky uncovered SparkCat malware embedded in apps on both the Apple App Store and Google Play Store.
- The malware uses optical character recognition (OCR) to scan screenshots for sensitive information, such as cryptocurrency wallet recovery phrases.
- Infected apps, including food delivery and AI chat tools like ComeCome, WeTink, and AnyGPT, have been downloaded over 242,000 times across both platforms.
- Apple and Google have removed most of the affected apps, but some may still be available for download or through sideloading.
- The origin of the malware remains uncertain, with researchers unable to confirm if it resulted from a supply chain attack or deliberate actions by developers.