Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Crypto-Stealing Malware Found in Mobile App Store SDKs, Warns Kaspersky

Crypto-Stealing Malware Found in Mobile App Store SDKs, Warns Kaspersky

YellowYellow2025/02/05 22:22
By:Yellow

Kaspersky Labs has identified a sophisticated malware campaign targeting cryptocurrency users through malicious software development kits embedded in mobile apps available on Google Play and the Apple App Store. Named "SparkCat," this malware utilizes optical character recognition to scan users' photos for cryptocurrency wallet recovery phrases, which hackers then use to access and deplete affected wallets.

In a comprehensive report dated February 4, 2025, Kaspersky researchers Sergey Puzan and Dmitry Kalinin detailed how the SparkCat malware infiltrates devices and searches images for recovery phrases through multilingual keyword detection. Once these phrases are obtained, attackers gain unfettered access to victims' crypto wallets. The hackers thus achieve full control over the funds, as highlighted by the researchers.

Moreover, the malware is designed to steal additional sensitive information, such as passwords and private messages captured in screenshots. Specifically on Android devices, SparkCat masquerades as a Java-based analytics module called Spark. The malware receives operational updates from an encrypted configuration file on GitLab and uses Google's ML Kit OCR to extract text from images on infected devices. Detection of a recovery phrase results in the malware sending the information back to attackers, allowing them to import the victim's crypto wallet onto their devices.

Kaspersky estimates that since its emergence in March 2023, SparkCat has been downloaded around 242,000 times, predominantly impacting users in Europe and Asia.

In a separate but related report from mid-2024, Kaspersky has been monitoring another Android malware campaign involving deceptive APKs like Tria Stealer, which intercepts SMS messages and call logs, and steals Gmail data.

The presence of this malware spans numerous apps, some seemingly legitimate like food delivery services, and others designed to attract unwary users, such as AI-enabled messaging apps. Common features among these infected apps include the use of the Rust programming language, cross-platform capabilities, and sophisticated obfuscation methods to evade detection.

The origins of SparkCat remain unclear. The researchers have not ascribed the malware to any known hacking group but have noted Chinese-language comments and error messages within the code, suggesting fluency in Chinese by the developer. While it shares similarities with a campaign uncovered by ESET in March 2023, its precise source remains unidentified.

Kaspersky strongly advises users against storing sensitive information like crypto wallet recovery phrases in their photo galleries. Instead, they recommend employing password managers and regularly scanning for and eliminating suspicious applications.

The findings were originally reported on 99Bitcoins in the article titled "Malicious SDKs on Google Play and App Store Steal Crypto Seed Phrases: Kaspersky."

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like

ESUSDT now launched for futures trading and trading bots

Bitget Announcement2025/07/16 11:12

New spot margin trading pair — CROSS/USDT, TAC/USDT!

Bitget Announcement2025/07/16 08:07

Subscribe to TANSSI Savings and enjoy up to 15% APR

Bitget Announcement2025/07/15 11:00

TACUSDT now launched for futures trading and trading bots

Bitget Announcement2025/07/15 10:40