Spyware “SparkKitty” On Android And iOS Targets Crypto Wallet Backups In Photo Apps: Kaspersky

- SparkKitty spreads through both official app stores and scam websites, posing as crypto services and a trojanized TikTok. - Once active, the malware exfiltrates gallery images and device details so attackers can extract wallet recovery phrases.

More articles

Meghna Chowdhury
Meghna Chowdhury
Meghna is a Journalism graduate with specialisation in Print Journalism. She is currently pursuing a Master's Degree in journalism and mass communication. With over 3.5 years of experience in the Web3 and cryptocurrency space, she is working as a Senior Crypto Journalist for UnoCrypto. She is dedicated to delivering quality journalism and informative insights in her field. Apart from business and finance articles, horror is her favourite genre.

Kaspersky researchers have found a new spy Trojan called SparkKitty that has been active since at least April 2024 on iOS and Android devices. It hides inside apps on Apple’s App Store, Google Play, and on scam websites. 

Once installed, it sends photos and device data to attackers. Experts believe the goal is to steal cryptocurrency assets from people in Southeast Asia and China by scanning images for wallet keys and passwords.

Discovery and Background

The Spy Trojan was uncovered by Kaspersky security teams after they noticed unusual data traffic from testing phones.

They linked it to a string of apps claiming to offer crypto services and gambling tools. The campaign also included a fake TikTok app. Kaspersky warned both Apple and Google, and the malicious apps have now been removed.

Connection to Earlier Threats

Technical details suggest SparkKitty is tied to a previous iOS threat called SparkCat. SparkCat was the first Trojan on iPhones with an optical character recognition module. 

That feature lets it scan gallery images for recovery phrases and passwords. SparkKitty builds on this work and broadens the scope to Android devices as well.

iOS Infection Method

On the App Store, SparkKitty posed as a crypto app under the name 币coin. It also spread through phishing pages that mimicked Apple’s official store. 

Attackers used a corporate app distribution tool designed for enterprise testing to trick iPhone users into installing the infected TikTok. 

Once the fake TikTok was opened, it stole photos from the gallery and even added links to a shady crypto store in the profile window. That store only takes cryptocurrency, raising more red flags.

Also Read: Lumma Malware Network Taken Down By Global Forces, Cutting Off Crypto Thefts

Android Infection Method

Android users faced infected apps both on Google Play and third-party sites. One such app, a messenger with a crypto exchange feature called SOEX, was downloaded over 10,000 times from the official store. 

Kaspersky also found APK files on scam websites. These sites pitched the apps as investment tools. They ran ads on platforms like YouTube to lure users. After installation, the apps worked as promised while secretly sending photos and device details to the hackers.

Risk to Crypto Assets

Researchers warn that images from the phone gallery can hold key information. Screenshots often contain wallet recovery phrases or access codes. 

By stealing these, attackers could drain accounts of their digital funds. The focus on crypto services and the embedded crypto-only store point to a clear goal: financial theft.

Response by Apple and Google

Kaspersky contacted both tech giants as soon as the threat was confirmed. Within days, Apple and Google removed the infected apps from their stores. Kaspersky continues to track new samples and update its antivirus definitions to catch SparkKitty variants.

Sergey Puzan, a malware analyst at Kaspersky, explained that iOS’s enterprise app tools can be abused to install harmful software outside the App Store. 

Dmitry Kalinin, another expert, noted that the campaign’s emphasis on crypto hints at direct financial motives. He said users should be careful about apps offering investment services and only download from trusted sources.

Security teams expect more campaigns to follow once one proves profitable. The rise of mobile crypto apps creates an attractive target. Users should keep their phones updated, use official stores, and inspect app permissions carefully.

Also Read: North Korean Hackers Use Job Interview Bait To Deploy PylangGhost Malware Against Crypto Professionals

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest