Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

SparkCat malware found on iOS and Android targets crypto wallets


A troubling new malware campaign targeting mobile users by capturing data from screenshots to rob from their crypto wallets has emerged.

The new SparkCat malware discovered by the cyber security company Kaspersky has been discovered within apps on both the Google Play store and the Apple App Store.

Final hours to get this OnePlus 13 deal

Final hours to get this OnePlus 13 deal

OnePlus is currently offering £100 off on the 512GB model of its latest flagship phone, alongside an additional £50 added to the value of whichever phone you want to trade in to get it.

  • OnePlus
  • £100 off
  • Now just £899

View Deal

The malware users optical character recognition (OCR) to harvest the details by scanning users’ image galleries on the look out for the recovery keys associated with cryptocurrency accounts.

While this method has been known to be used by scammers on Android, the firm notes it’s the first time such an attack has penetrated Apple’s ecosystem. The iOS-based malicious code was based on similar tech that powered the Android tool.

“We found Android and iOS apps, some available in Google Play and the App Store, which were embedded with a malicious SDK/framework for stealing recovery phrases for crypto wallets,” Kaspersky wrote in a blog post revealing its findings.

“The infected apps in Google Play had been downloaded more than 242,000 times. This was the first time a stealer had been found in Apple’s App Store.”

The crafty malware looks works by using the app to send a request to read photo galleries. If helpful account details are found, they are sent back to the attackers, who can exploit them to steal.

It’s currently not clear how the malware made it into affected apps and whether anyone has lost money via the scheme, but Kaspersky says one such app, a Chinese food and grocery delivery app called ComeCome is still available to download.

A screenshot nightmare

If there was ever a reason to purge your screenshots library from your phone gallery, this is it. Those quick grabs we make to safeguard information belongs in a secure locker, rather than the gallery where we keep our photos.

While there’s no evidence of this malware actually costing people money at this point, it only takes one. I’d recommend taking a look at your screenshot library and deleting anything sensitive or relocating it.

Chris Smith



You May Also Like