Cybersecurity firm Kaspersky has warned of a newly discovered malware known as SparkKitty, which steals photos from infected devices in the hopes of finding crypto seed phrases.
Kaspersky analysts Sergey Puzan and Dmitry Kalinin said in a report on Monday that SparkKitty is targeting both iOS and Android devices by infiltrating some of the apps on the Apple App Store and Google Play.
Once a device is infected, the malicious software indiscriminately steals all images in the photo gallery.
“Although we suspect the attackers’ main goal is to find screenshots of crypto wallet seed phrases, other sensitive data could also be present in the stolen images.”
Malicious apps focus on crypto themes
Two apps used to deliver the malware found by Kaspersky focused on crypto. One known as 币coin, which markets itself as a crypto information tracker, was on the App Store.
The second was SOEX, a messaging app with “crypto exchange features” on Google Play.
“This app was uploaded to Google Play and installed over 10,000 times. We notified Google about it, and they removed the app from the store,” Puzan and Kalinin said.
A Google spokesperson confirmed to Coinpectra that the app had been removed from Google Play, and the developer was banned.
“Android users are automatically protected against this app regardless of download source by Google Play Protect, which is on by default on Android devices with Google Play Services,” the spokesperson said.
The Kaspersky analysts also discovered instances of SparkKitty being delivered through casino apps, adult-themed games and malicious TikTok clones.
SparkCat’s little brother
The malware is similar to SparkCat, which was identified during a Kaspersky investigation in January. The malware scans users’ pictures to find crypto wallet recovery phrases.
Both versions of the malware are likely from the same source, Puzan and Kalinin said, because they share similar features and include similar file paths from the attackers’ systems.
“While not technically or conceptually complex, this campaign has been ongoing since at least the beginning of 2024 and poses a significant threat to users,” Puzan and Kalinin said.
“Unlike the previously discovered SparkCat spyware, this malware isn’t picky about which photos it steals from the gallery.”
Related: Hackers are selling counterfeit phones with crypto-stealing malware
Southeast Asia and China main targets
The main targets of this malware campaign are users in Southeast Asia and China, based on Kaspersky’s findings, as the infected apps include various Chinese gambling games, TikTok and adult games.
“Judging by the distribution sources, this spyware primarily targets users in Southeast Asia and China,” Puzan and Kalinin said.
“However, it doesn’t have any technical limitations that would prevent it from attacking users in other regions,” they added.
Magazine: History suggests Bitcoin taps $330K, crypto ETF odds hit 90%: Hodler’s Digest, June 15 – 21