{"id":483,"date":"2026-04-03T10:11:08","date_gmt":"2026-04-03T10:11:08","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=483"},"modified":"2026-04-03T10:11:08","modified_gmt":"2026-04-03T10:11:08","slug":"new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=483","title":{"rendered":"New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 03, 2026<\/span><\/span><span class=\"p-tags\">Mobile Security \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj2s09d3X9qYABLHP5v1u9iyjRN5p28u6xvnL0qkKR1-s1CsqtIDAWeQCFKQ9S4Mde1ueUmzcjNA9SAzWN-lDWwbmTmmlwbbLkyKx-EJc2-bjhKlEsChsp3iZ6watrZ4I8LJdL_p0vatW4NrXntcs6_xdReGEQJMUCgfAFo-ZfCy_jDsxEZgPMx1T9e1e0L\/s1700-e365\/mobile-wallet-seed.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers\u00a0have <a href=\"https:\/\/x.com\/kaspersky\/status\/2039649347181191443\">discovered<\/a> a new version of\u00a0the <strong>SparkCat<\/strong> malware on the Apple App Store and Google Play Store, more than a year after the\u00a0trojan was discovered targeting both the mobile operating\u00a0systems.<\/p>\n<p>The\u00a0malware\u00a0has\u00a0been found to conceal itself within seemingly benign apps, such as enterprise messengers and food delivery services, while silently scanning victims&#8217; photo galleries for cryptocurrency wallet recovery\u00a0phrases.<\/p>\n<p>Russian cybersecurity company\u00a0Kaspersky said it\u00a0found two infected apps on the App Store and one\u00a0on the Google Play\u00a0Store that primarily target cryptocurrency users in\u00a0Asia.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThe iOS variant, however, takes a different approach as it scans for cryptocurrency wallet mnemonic phrases, which are in English,\u00bb the company said. \u00abThis makes the iOS variant potentially broader in reach, as it can affect users regardless of their\u00a0region.\u00bb<\/p>\n<p>The\u00a0improved version of SparkCat for Android incorporates several obfuscation layers compared to previous iterations. This\u00a0includes the use of code virtualization and cross-platform programming languages to sidestep analysis\u00a0efforts. What&#8217;s\u00a0more, the Android version scans for Japanese, Korean, and Chinese keywords, indicating an Asian\u00a0focus.<\/p>\n<p>SparkCat was first documented by Kaspersky in February 2025, highlighting its ability to leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to an attacker-controlled\u00a0server.<\/p>\n<p>The\u00a0latest improvements to the\u00a0malware show that it&#8217;s an actively evolving\u00a0threat, not to\u00a0mention the technical capabilities of the threat actors behind the operation. Kaspersky had previously assessed the malicious activity to be the work of a Chinese-speaking\u00a0operator.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThe updated variant of SparkCat requests access to view photos in a user&#8217;s smartphone gallery in certain scenarios \u2014 just like the very first version of the Trojan,\u00bb Kaspersky researcher Sergey Puzan told The Hacker News. \u00abIt analyzes the text in stored images using an optical character recognition\u00a0module.\u00bb<\/p>\n<p>\u00abIf the stealer finds relevant keywords, it sends the image to the attackers. Considering the similarities of the current sample and the previous one, we believe that the developers of the new version of malware are the same. This\u00a0campaign again underscores the importance of using security solutions for smartphones to stay protected against a broad range of cyberthreats.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 03, 2026Mobile Security \/ Threat Intelligence Cybersecurity researchers\u00a0have discovered a new version of\u00a0the SparkCat malware on the Apple App Store and Google Play Store, more than a year&hellip;<\/p>\n","protected":false},"author":1,"featured_media":484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[281,616,143,1052,428,1051,1050,1048,295,664,1049],"class_list":["post-483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-android","tag-apps","tag-crypto","tag-images","tag-ios","tag-phrase","tag-recovery","tag-sparkcat","tag-steals","tag-variant","tag-wallet"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=483"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/483\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/484"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}