New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接描述文章内容。 首先,我需要快速阅读文章,抓住主要信息。文章讲的是研究人员在苹果和谷歌应用商店发现了SparkCat恶意软件的新版本。这个恶意软件隐藏在看似无害的应用中,比如企业通讯和送餐服务,悄悄扫描用户的相册,寻找加密货币钱包的恢复短语。 然后,Kaspersky公司发现了两个感染的应用在App Store,一个在Google Play Store,主要针对亚洲的加密货币用户。iOS版本扫描的是英文短语,可能影响更广泛的地区。Android版本增加了混淆层,并且扫描日语、韩语和中文关键词。 SparkCat最初是在2025年2月被记录的,利用OCR模型从相册中提取钱包恢复短语。最新的改进显示这是一个活跃演变的威胁,背后的威胁行为者可能是中文使用者。 最后,研究人员建议使用安全解决方案来保护手机免受各种网络威胁。 现在我要把这些信息浓缩到100字以内。重点包括:发现新版本、隐藏在应用中、扫描相册找恢复短语、针对亚洲加密货币用户、技术手段如混淆层和OCR模块、以及背后的技术能力。 可能的结构是:研究人员发现SparkCat新版本隐藏于应用商店中的 benign apps 中,扫描相册找加密货币钱包短语。iOS版影响更广,Android版针对亚洲用户,并采用混淆技术。这显示了恶意软件的活跃性和背后的技术实力。 </think> 研究人员发现 SparkCat 恶意软件新版本藏于苹果和谷歌应用商店中的 benign apps 中,扫描用户相册以寻找加密货币钱包恢复短语。iOS 版本影响更广,而 Android 版本则针对亚洲用户并采用混淆技术。此恶意软件显示活跃进化特性及背后技术能力。 2026-4-3 09:10:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Mobile Security / Threat Intelligence

Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating systems.

The malware has been found to conceal itself within seemingly benign apps, such as enterprise messengers and food delivery services, while silently scanning victims' photo galleries for cryptocurrency wallet recovery phrases.

Russian cybersecurity company Kaspersky said it found two infected apps on the App Store and one on the Google Play Store that primarily target cryptocurrency users in Asia.

"The iOS variant, however, takes a different approach as it scans for cryptocurrency wallet mnemonic phrases, which are in English," the company said. "This makes the iOS variant potentially broader in reach, as it can affect users regardless of their region."

The improved version of SparkCat for Android incorporates several obfuscation layers compared to previous iterations. This includes the use of code virtualization and cross-platform programming languages to sidestep analysis efforts. What's more, the Android version scans for Japanese, Korean, and Chinese keywords, indicating an Asian focus.

SparkCat was first documented by Kaspersky in February 2025, highlighting its ability to leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to an attacker-controlled server.

The latest improvements to the malware show that it's an actively evolving threat, not to mention the technical capabilities of the threat actors behind the operation. Kaspersky had previously assessed the malicious activity to be the work of a Chinese-speaking operator.

"The updated variant of SparkCat requests access to view photos in a user's smartphone gallery in certain scenarios — just like the very first version of the Trojan," Kaspersky researcher Sergey Puzan told The Hacker News. "It analyzes the text in stored images using an optical character recognition module."

"If the stealer finds relevant keywords, it sends the image to the attackers. Considering the similarities of the current sample and the previous one, we believe that the developers of the new version of malware are the same. This campaign again underscores the importance of using security solutions for smartphones to stay protected against a broad range of cyberthreats."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html
如有侵权请联系:admin#unsafe.sh