Unprecedented: Crypto-Stealing Malware Breaches Apple App Store Security for First Time

Unprecedented: Crypto-Stealing Malware Breaches Apple App Store Security for First Time

Malicious SDK “SparkCat” Discovered in Mobile Apps Targeting Cryptocurrency Users

A sophisticated cryptocurrency theft campaign dubbed “SparkCat” has been uncovered, affecting both Android and iOS applications available on official app stores. Security researchers at Kaspersky have identified a malicious software development kit (SDK) embedded within multiple apps, collectively downloaded over 242,000 times from Google Play alone.

Key Findings:
– First documented case of such a stealer in the Apple App Store
– Affects 18 Android and 10 iOS applications
– Uses optical character recognition (OCR) to steal crypto wallet recovery phrases

Technical Implementation:
The malware operates through different components:
– Android: Uses “Spark” Java component disguised as analytics
– iOS: Appears under names like “Gzip,” “googleappsdk,” or “stat”
– Employs Google ML Kit OCR for text extraction
– Utilizes Rust-based networking module for C2 communication
– Configuration files stored on GitLab

Theft Mechanism:
– Scans device images for wallet recovery phrases
– Supports multiple languages (Latin, Korean, Chinese, Japanese)
– Uses region-specific keywords for targeting
– Transmits device information to command servers

Security Recommendations:
– Immediately uninstall affected applications
– Scan devices with mobile antivirus software
– Consider factory reset if infected
– Avoid storing wallet recovery phrases in screenshots
– Use offline storage methods for cryptocurrency credentials

The investigation remains ongoing, with both Apple and Google being notified about the compromised applications in their respective stores.

Share This Article