Particle.news

Download on the App Store

Crypto-Stealing Malware Found in Apps on Apple and Google Stores

The SparkCat malware uses OCR technology to extract sensitive data from screenshots, targeting crypto wallet recovery phrases.

  • Security researchers at Kaspersky uncovered SparkCat malware embedded in apps on both the Apple App Store and Google Play Store.
  • The malware uses optical character recognition (OCR) to scan screenshots for sensitive information, such as cryptocurrency wallet recovery phrases.
  • Infected apps, including food delivery and AI chat tools like ComeCome, WeTink, and AnyGPT, have been downloaded over 242,000 times across both platforms.
  • Apple and Google have removed most of the affected apps, but some may still be available for download or through sideloading.
  • The origin of the malware remains uncertain, with researchers unable to confirm if it resulted from a supply chain attack or deliberate actions by developers.
Hero image