Cybersecurity researchers at Kaspersky have что такое порноuncovered a new and dangerous malware strain, which they believe has been active since at least Feb. 2024.
Dubbed SparkKitty, the malware is part of the broader SparkCat family — a line of Trojan horse programs designed to steal cryptocurrency from unsuspecting users. Kaspersky first discovered the original SparkCat malware in Jan. 2025, noting that it had already made its way onto both the Google Play Store and Apple’s App Store.
SEE ALSO: Scammers tricked TikTok users into downloading malware with AI videosLike many trojans, these malicious apps disguise themselves as legitimate software. In the crypto world, this can be especially risky. The researchers say that one such Android app, SOEX, posed as a messaging platform with cryptocurrency trading features. They say it racked up more than 10,000 downloads on Google Play before being flagged. Kaspersky researchers found a similar app on the iOS app store, as well as modified versions of the TikTok app posing as the real thing.
SparkKitty is specifically engineered to access users’ photo libraries. The reasoning being that many crypto users screenshot their recovery phrases — which are needed to restore access to their wallets — and store them in their camera rolls. By extracting these images, attackers can potentially gain full access to victims’ crypto accounts.
Malware like SparkKitty is built to scan for images that could be valuable to attackers. However, unlike its more targeted predecessor, SparkCat, SparkKitty isn’t especially selective — it scoops up a broad range of images and sends them back to the attackers, regardless of content, according to a detailed report on Secure List by Kapersky.
While the primary concern remains the theft of crypto wallet recovery phrases, broader access to users’ photo libraries opens the door to other risks, including potential extortion using sensitive or private images. That said, there appears to be no evidence that the stolen images have been used for blackmail or similar schemes.
Kaspersky reports that the malware campaign has primarily targeted users in Southeast Asia and China. Most of the infected apps were disguised as Chinese gambling games, TikTok clones, and adult entertainment apps, all tailored to users in those regions.
Topics Cybersecurity
How to watch the 2021 NBA playoffs without cableChromebooks are beating Macs, but which Chromebook's for you?Chromebooks are beating Macs, but which Chromebook's for you?'Army of the Dead' changes the game for zombies, say zombie expertsHere's how to apply for Twitter account verificationHow to see who is watching your Netflix accountHackers are using Trump’s election fraud conspiracy to break into U.S. government agenciesWhat is a super flower blood moon and how can you see it?Prince Harry and Oprah's mental health show is a candid look at traumaMutual masturbation can bring you closer to your partner, even over FaceTime How to help those getting pummeled by extreme weather in Texas Pixel 5a leaks, looks pretty much the same as Pixel 4a 5G Disney+ release dates for 'Loki,' 'Star Wars: The Bad Batch' and more 'I Care a Lot' review: Rosamund Pike shines in uneven Netflix thriller Tesla lowers base Model 3 and Model Y prices Twitter experiments with voice DMs Target is putting mini Apple stores inside its stores Twitter is now adding a controversial 'hacked materials' warning label to tweets Australian news app beats Facebook in App Store Why 1619 is an important year in U.S. history
0.1726s , 8001.6796875 kb
Copyright © 2025 Powered by 【что такое порно】New malware scans photos on both Android and iOS devices,Feature Flash