• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new sparkcat variant in ios, android apps steals crypto wallet

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

You are here: Home / General Cyber Security News / New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
April 3, 2026

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating systems.

The malware has been found to conceal itself within seemingly benign apps, such as enterprise messengers and food delivery services, while silently scanning victims’ photo galleries for cryptocurrency wallet recovery phrases.

Russian cybersecurity company Kaspersky said it found two infected apps on the App Store and one on the Google Play Store that primarily target cryptocurrency users in Asia.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“The iOS variant, however, takes a different approach as it scans for cryptocurrency wallet mnemonic phrases, which are in English,” the company said. “This makes the iOS variant potentially broader in reach, as it can affect users regardless of their region.”

The improved version of SparkCat for Android incorporates several obfuscation layers compared to previous iterations. This includes the use of code virtualization and cross-platform programming languages to sidestep analysis efforts. What’s more, the Android version scans for Japanese, Korean, and Chinese keywords, indicating an Asian focus.

SparkCat was first documented by Kaspersky in February 2025, highlighting its ability to leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to an attacker-controlled server.

The latest improvements to the malware show that it’s an actively evolving threat, not to mention the technical capabilities of the threat actors behind the operation. Kaspersky had previously assessed the malicious activity to be the work of a Chinese-speaking operator.

Cybersecurity

“The updated variant of SparkCat requests access to view photos in a user’s smartphone gallery in certain scenarios — just like the very first version of the Trojan,” Kaspersky researcher Sergey Puzan told The Hacker News. “It analyzes the text in stored images using an optical character recognition module.”

“If the stealer finds relevant keywords, it sends the image to the attackers. Considering the similarities of the current sample and the previous one, we believe that the developers of the new version of malware are the same. This campaign again underscores the importance of using security solutions for smartphones to stay protected against a broad range of cyberthreats.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «drift loses $285 million in durable nonce social engineering attack Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
  • Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
  • Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
  • Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
  • ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
  • Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
  • The State of Trusted Open Source Report
  • WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
  • Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
  • CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Copyright © TheCyberSecurity.News, All Rights Reserved.