Malware, Application security

Novel crypto-targeting SparkCat malware campaign examined

Male hand holding smart phone outside.

Numerous fake artificial intelligence, Web3, and food delivery apps on Google's and Apple's app stores have been leveraged to deliver the SparkCat malware that compromises cryptocurrency wallets' mnemonic phrases as part of an attack campaign that has been underway since March, The Hacker News reports.

Both Android and iOS versions of SparkCat exploit the Google ML Kit library's optical character recognition model to facilitate the exfiltration of crypto wallet recovery phrase-containing images to attackers' command-and-control server via Rust, a report from Kaspersky revealed. "What makes this Trojan particularly dangerous is that there's no indication of a malicious implant hidden within the app. The permissions that it requests may look like they are needed for its core functionality or appear harmless at first glance," said Kaspersky researchers. Such a development comes after separate reports from security researcher Patrick Wardle and the Palo Alto Networks Unit 42 threat intelligence team detailing the increasing prevalence of newly emergent macOS malware and macOS infostealers' exploitation of the AppleScript framework, respectively.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds