iOS App Store apps with screenshot-reading malware found for the first time

Share via:


Apps distributed through both Apple and Google’s app stores are hiding malicious screenshot-reading code that’s being used to steal cryptocurrency, the cybersecurity software firm Kaspersky reported today. It’s the “first known case” of apps infected with malware that uses OCR tech to extract text from images making it into Apple’s App Store, according to a blog post detailing the company’s findings.

Kaspersky says it discovered the code from this particular malware campaign, which it calls “SparkCat,” in late 2024 and that the frameworks for it appear to have been created in March of the same year.

On iOS and in some Android instances, the malware works by triggering a request to access users’ photo galleries when they attempt to use chat support within the infected app. Once permission is granted, it uses Google OCR tech, which lets it decipher text found in photos, to look for things like screenshots of crypto wallet passwords or recovery phrases. The software then sends any images it finds back to the attackers, who can then use the info to access the wallets and steal crypto.

Kaspersky says it can’t “confirm with certainty the infection was a result of a supply chain attack or deliberate action by the developers.” The company names two AI chat apps that seem to have been created for the campaign and appear to still be available on the App Store, called WeTink and AnyGPT. Additionally, Kaspersky found the malicious code in a legitimate-seeming food delivery app called ComeCome, which you can also still download.

Neither Apple nor Google immediately responded to The Verge’s request for comment.



Source link

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

iOS App Store apps with screenshot-reading malware found for the first time


Apps distributed through both Apple and Google’s app stores are hiding malicious screenshot-reading code that’s being used to steal cryptocurrency, the cybersecurity software firm Kaspersky reported today. It’s the “first known case” of apps infected with malware that uses OCR tech to extract text from images making it into Apple’s App Store, according to a blog post detailing the company’s findings.

Kaspersky says it discovered the code from this particular malware campaign, which it calls “SparkCat,” in late 2024 and that the frameworks for it appear to have been created in March of the same year.

On iOS and in some Android instances, the malware works by triggering a request to access users’ photo galleries when they attempt to use chat support within the infected app. Once permission is granted, it uses Google OCR tech, which lets it decipher text found in photos, to look for things like screenshots of crypto wallet passwords or recovery phrases. The software then sends any images it finds back to the attackers, who can then use the info to access the wallets and steal crypto.

Kaspersky says it can’t “confirm with certainty the infection was a result of a supply chain attack or deliberate action by the developers.” The company names two AI chat apps that seem to have been created for the campaign and appear to still be available on the App Store, called WeTink and AnyGPT. Additionally, Kaspersky found the malicious code in a legitimate-seeming food delivery app called ComeCome, which you can also still download.

Neither Apple nor Google immediately responded to The Verge’s request for comment.



Source link

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

Rustom Kerawalla’s VIBGYOR Group of Schools Expands to Build...

New Delhi , March 28: In 2024, the...

CNBC-TV18 newsbreak confirmed: Cabinet approves ₹22,919 crore electronics PLI...

In a major push for domestic electronics manufacturing,...

Apple’s first iOS 19 tease gives off a vibe...

This week brought the official announcement of WWDC,...

Popular

Upcoming Events

ChatGPT’s viral Studio Ghibli-style images highlight AI copyright concerns

Fans of Studio Ghibli, the famed Japanese animation...

WhatsApp can now be set as the default calling...

WhatsApp is introducing a new feature that allows...

Airtel Bundles JioHotstar Subscription on All Postpaid Plans

Indian telecom service provider Bharti Airtel has already...
afg afg afg afg afg afg ADGF ADGF ADGF ADGF ADGF ADGF ADGF ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account