New SparkCat malware in official app stores targets cryptocurrency wallet images

April 6, 20262 min read1 sources
Share:
New SparkCat malware in official app stores targets cryptocurrency wallet images

A new variant of the SparkCat trojan has been discovered on both the Apple App Store and Google Play Store, designed specifically to steal images of cryptocurrency wallet recovery phrases. Security researchers report the malware masquerades as benign applications, including enterprise messengers and food delivery services, to bypass platform security checks and trick users into installation.

Once installed, the malware’s primary objective is to gain access to a user's photos or the ability to capture the device's screen. It leverages deceptive permission requests to achieve this. After access is granted, SparkCat actively scans the device’s photo gallery for saved images of seed phrases or waits for a user to display a recovery phrase in a wallet app to capture a screenshot. These phrases, which act as a master key to a cryptocurrency wallet, are then sent to an attacker-controlled server.

The impact for victims is direct and severe: the complete and often irreversible loss of their cryptocurrency assets. The presence of this malware on official app stores highlights a persistent challenge for Google and Apple's security vetting processes. It also demonstrates a calculated effort by cybercriminals to target high-value digital assets by exploiting common user behaviors, such as screenshotting a recovery phrase for backup.

This discovery follows the initial identification of the SparkCat trojan over a year ago, indicating the malware's operators are continuously refining their techniques to evade detection. Mobile users, particularly those managing digital assets, are advised to be extremely cautious with app permissions and to avoid storing sensitive information like recovery phrases as digital images on their devices.

Share:

// SOURCES

// RELATED

Anatomy of a failed budget cut: When the White House tried to defund America’s cyber defense

In 2020, the White House proposed a $707 million cut to CISA's budget, sparking bipartisan backlash and a debate on U.S. cyber readiness.

6 min readApr 8

Flowise AI agent builder under active CVSS 10.0 RCE exploitation; 12,000+ instances exposed

A critical CVSS 10.0 remote code execution vulnerability in the Flowise AI platform is under active attack, exposing over 12,000 instances to complete

5 min readApr 7

Fortinet customers confront actively exploited zero-day, with a full patch still pending

A critical, actively exploited SQL injection flaw (CVE-2024-35616) in FortiClient EMS allows for full server takeover. A hotfix is available now.

5 min readApr 7

BlueHammer zero-day leak puts Windows users at risk after researcher-Microsoft dispute

A disgruntled researcher has leaked “BlueHammer,” a Windows zero-day exploit, after a dispute with Microsoft, enabling attackers to gain full SYSTEM c

6 min readApr 7