SparkKitty Steals Photos from Devices
SparkKitty, a sneaky crypto-stealing malware, targets Android and iOS devices. It emerged since February 2024 on Google Play and App Store. For example, it steals photos to find wallet recovery phrases. This threat endangers user privacy and funds.
How the Attack Starts
The malware hides in apps like SOEX and 币coin. Users download these from official or unofficial sources. Additionally, it spreads via modded TikTok clones and casino games. Consequently, it infects devices unnoticed.
Malware Capabilities
SparkKitty grabs all photos from your gallery. It uses OCR to spot cryptocurrency seed phrases. For instance, it uploads images with text to attackers. As a result, it risks extortion and financial loss.
Delivery and Evolution
The malware evolved from SparkCat, spotted in January 2025. It embeds in fake frameworks on iOS and Xposed modules on Android. A report notes it checks configs via AES-256 decryption. Therefore, it adapts to evade detection.
Targeting and Impact
It hit over 10,000 Android downloads with SOEX. Attackers target crypto users with sensitive data. Moreover, it requests gallery access on iOS and storage on Android. This exposes users to widespread data theft.
Broader Mobile Threats
Similar malware slips into vetted app stores. It uses malicious SDKs to access photos. For example, gambling and adult apps spread it unofficially. As a result, trust in app platforms weakens.
Challenges for Users
The malware’s stealth bypasses app store checks. It auto-executes code on launch or user actions. Additionally, stolen data fuels crypto scams. This demands heightened user awareness and protection.
Preventing SparkKitty Attacks
To stop SparkKitty, avoid unverified app downloads. For example, stick to official sources and check reviews. Disable unnecessary permissions and use antivirus software. Additionally, back up photos securely offline. These steps help protect your device and data.
Sleep well, we got you covered.