Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Sparkcat malware uses OCR to extract crypto wallet recovery phrases from images
Identity

Sparkcat malware uses OCR to extract crypto wallet recovery phrases from images

userBy userFebruary 6, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Sparkcat Malware

A new malware campaign called Sparkcat has leveraged fake apps on both Apple and Google app stores to steal mnemonic phrases from victims related to cryptocurrency wallets.

The attack leverages an optical character recognition (OCR) model to remove selected images containing wallet recovery phrases from the photo library to a command and control (C2) server, and Kaspersky researchers Dmitry Kalinin and Sergey Puzan mentioned in the technical report.

This moniker is a reference to an embedded software development kit (SDK) that employs a Java component called Spark, which poses as an analysis module. Currently, it is unclear whether the infection was the result of a supply chain attack or whether it was intentionally introduced by the developer.

This is not the first time that Android malware with OCR functionality has been detected in the wild, but it is one of the first instances where such a steeler has been discovered in Apple’s App Store. It is said that the infected app on Google Play has been downloaded more than 242,000 times.

Cybersecurity

The campaign has been rated active since March 2024, and the app is distributed through both the official and unofficial app stores. The application is equipped with artificial intelligence (AI), food delivery, and Web3 apps, but some of them seem to offer legitimate features.

“The Android malware module decrypts and launches an OCR plugin built with Google’s ML kit library and uses it to recognize the text in images in the gallery,” says Kaspersky. “Images matching keywords received from C2 have been sent to the server.”

Similarly, the iOS version of SparkCat relies on Google’s ML kit library, where OCR steals images containing mnemonic phrases. A notable aspect of malware is the use of C2 rust-based communication mechanisms, which are rarely observed in mobile apps.

Further analysis of the keywords used and the regions in which these apps were made available indicate that the campaign is primarily targeted at European and Asian users. Malicious activities are recognized as the work of threat actors who are proficient in Chinese.

“What makes this Trojan horse particularly dangerous is its lack of indication that malicious implants are hidden within the app,” the researchers said. “The authority it requests may appear to be necessary for its core functionality or seem harmless.”

This disclosure allows Zimperium Zlabs to distribute malicious APK files via WhatsApp under the guise of bank and government applications, allowing apps to harvest sensitive obstacles and financial information, and to enable them to harvest the app’s sensitive obstacles and financial information. This is because we detailed another mobile malware campaign targeting owners.

Cybersecurity companies have identified over 1,000 fake apps linked to the campaign, and attackers have roughly 1,000 hardcoding phone numbers as exfiltration points for SMS messages and one-time passwords (OTP). He said he is using it.

Unlike traditional bank trojans that rely solely on one-time password (OTP) theft command and control (C&C) servers, this malware campaign leverages live phone numbers to redirect SMS messages and to redirect them. We’ll leave trackable digital trails for enforcement agencies, tracking the threat actors behind this campaign,” said security researcher Aazim Yaswant.

The attack campaign, named Fatboypanel, is said to have accumulated 2.5 GB of sensitive data so far. All of these are hosted on FireBase endpoints that can be accessed by people who can use authentication.

This includes SMS messages from Indian banks, bank details, credit and debit card information, and government-issued identification details to which around 50,000 users belong. Madhya Pradesh.

Sparkcat Malware

Even if these incidents have been uploaded to the official app storefront, properly reviewing code apps, including scrutinizing reviews and checking developer reliability before downloading them. We take note of the importance of doing so.

According to security researcher Patrick Wardle, the development follows the emergence of 24 new malware families targeting Apple Macos Systems from 21 in 2024 to 2024.

Cybersecurity

This coincides with a surge in information theft attacks such as Poseidon, Atomic and Cthulhu targeting users of desktop operating systems.

“InfoSealers that utilize Macau often have a native Applescript framework,” Palo Alto Network Unit 42 researchers Tom Factorman, Chenellich and Tom Sharon said in a report released this week. .

“This framework provides extensive OS access and simplifies execution with natural language syntax. Threat actors use this framework because these prompts can look like legitimate system prompts. and deceive the victims through social engineering.”

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePresto builds stripes for EV charging
Next Article Clinical tests to detect respiratory diseases in dogs
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.