Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google AI embedds agents deeply in its data stack – what can they do for you here

    August 6, 2025

    Apple’s Support App was reportedly updated with AI-Investigated Chatbot

    August 6, 2025

    Airpods Pro 2 has fallen at a new low price – here why they are still valid in 2025

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Malware stole your photo on Google Play, Apple App Store- and Crypto
    Security

    Malware stole your photo on Google Play, Apple App Store- and Crypto

    PineapplesUpdateBy PineapplesUpdateJune 23, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Malware stole your photo on Google Play, Apple App Store- and Crypto
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Malware stole your photo on Google Play, Apple App Store- and Crypto

    A new mobile crypto-chori malware called Sparkcatti was found in apps on Google Play and Apple App Store, which targets Android and iOS devices.

    Malware is a possible development of Sparkcat, which was discovered by Kaspasky in January. Sparkcat used optical character recognition (OCR) to steal cryptocurrency wallet recovery phrases from pictures saved on infected equipment.

    When installing the crypto wallets, the installation process asks users to write the recovery phrase of the wallet and store it in a safe, offline location.

    Access to this seed phrase can be used to restore the crypto wallet and its stored property on another device, making them a valuable target for danger actors.

    Taking a screenshot of your seed phrase is never a good idea, some people do so for convenience.

    A Report by kaspersky It is said that the new sparkcitty malware indiscriminately steals all images from the photo gallery of an infected device.

    While Kasperki believes that malware is targeting crypto wallet seed phrases, stolen data can also be used for other malicious purposes, such as forced recovery, if images contain sensitive materials.

    Sparkcitty malware

    The Sparkkitty campaign is active since minimal February 2024, which is spreading through both the official Google and Apple App Store and informal platforms.

    Sparkkitty on apple app store
    Sparkkitty on apple app store
    Source: Kasperki

    Recognized malicious apps Kaspaski are soex on the Apple app store on the Apple App Store, both have been removed by the time of this writing.

    Soex is a messaging app with the Cryptocurrency Exchange features, which has been downloaded more than 10,000 times through Android’s official app store.

    Malware app on google play
    Malware app on google play
    Source: Kasperki

    Kaspersky discovered tiktok clones, which were distributed through sparkcitty, informal channels containing fake online cryptocurrency stores, gambling apps, adult-theme games and casino apps.

    Tiktok Clone App installed through informal sites
    Tiktok Clone App is installed through an iOS profile
    Source: Kasperki

    On iOS, Sparkkitty is embedded as a fake outline (Afnetworking.framework, Libswiftdarwin.Dylib) and sometimes given through an enterprise provisioning profile.

    On Android, the malware is embedded in the Java/Kotlin apps, some of which use malicious xposed/lsposed modules.

    The malicious structure uses objective-C ‘+load’ method to automatically execute its code when the app starts on iOS. A configuration is checked by reading the keys from the information of the app. The execution only moves forward when values ​​match the expected wire.

    On Android, malware is triggered at the app launch or on the functions operated by specific users such as opening a specified screen type. In case of activation, it reinforces and decips a remote configuration file using AES-256 (ECB mode) to obtain C2 URL.

    On iOS, the malware requests to reach the photo gallery, while on Android, the malicious app requested the user to give storage permissions to reach the images.

    If allowed on iOS, malfunctions monitor the gallery for malware changes and extend any new or pre -unplanned images.

    Image exfiltration code on iOS
    Image Exfility Code on iOS variants
    Source: Kasperki

    On Android, the malware device uploads images from the gallery with identifiers and metadata. Kaspersky found some sparkcitty versions that use Google Ml Kit OCR and only upload and upload images with lessons.

    Image Exfiltration Logic on Android
    Image Exfiltration Logic on Android
    Source: Kasperki

    Sparkkitty is another example of slipping malware in the official app store, highlights once again that users should not rely on software on vetted distribution channels.

    All apps should be investigated for signs of fraud, such as fake reviews, publishers with suspected background or history, low downloads are combined with high number of positive reviews, etc.

    During installation, requests for storage of gallery access should be treated with suspicion and denied whether they are not related to the main functionality of the app.

    On iOS, avoid installing configuration profiles or certificates until they come from a reliable source. On Android, enable protects in Google Play settings and scan the full-device regularly.

    Finally, cryptocurrency holders should not place images of their wallet seed phrases on their mobile devices, as they are now actively targeted by malware. Instead, store them offline to a safe place.

    Bleepingcomputer has contacted both Apple and Google to contact a comment on how these apps cracks and their apps slipped into the store.

    Google told Bleepingcomputer, “The report reported has been removed from the Google Play and the developer has been banned.”

    “Android users are automatically preserved against this app regardless of the download source by Google Play Protect, default on Android devices with Google Play services.”

    Bleepingcomputer also contacted Apple about Apps and will update the story if we get a response.


    Tines needle

    Patching meant complex scripts, long and endless fire drills. No more.

    In this new guide, the tines break down how it is leveling with modern organ automation. Patch fast, reduce overhead, and focus on strategic tasks – no complex script is required.

    app Apple crypto Google Malware photo Play stole Store
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article6 ways Hollywood keeps screwing the movie reboot and remake
    Next Article Your Android phone found only a major Gemini upgrade for music fans – and it’s free
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Google AI embedds agents deeply in its data stack – what can they do for you here

    August 6, 2025
    Web3

    Apple’s Support App was reportedly updated with AI-Investigated Chatbot

    August 6, 2025
    Security

    Airpods Pro 2 has fallen at a new low price – here why they are still valid in 2025

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Google AI embedds agents deeply in its data stack – what can they do for you here

    August 6, 2025

    Apple’s Support App was reportedly updated with AI-Investigated Chatbot

    August 6, 2025

    Airpods Pro 2 has fallen at a new low price – here why they are still valid in 2025

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.