![](/rp/kFAqShRrnkQMbH6NYLBYoJ3lq9s.png)
SparkCat — first OCR trojan stealer to infiltrate the App ... - Kaspersky
1 day ago · SparkCat infostealer infected apps in the App Store and Google Play. It scans photos on infected devices and steals crypto wallets. ... Kaspersky Password Manager allows you to securely store and sync not only passwords and two-factor authentication tokens but also banking card details and scanned documents across all your devices — all in ...
Kaspersky discovers new crypto-stealing Trojan in AppStore and …
3 days ago · Kaspersky Threat Research expertise center has discovered a new data-stealing Trojan, SparkCat, active in AppStore and Google Play since at least March 2024. This is the first known instance of optical recognition-based malware appearing in AppStore. SparkCat uses machine learning to scan image galleries and steal screenshots containing cryptocurrency wallet recovery phrases.
Kaspersky Finds SparkCat Malware Targeting Crypto Wallets
1 day ago · SparkCat leverages machine learning to scan image galleries, stealing cryptocurrency wallet recovery phrases, passwords, and other sensitive data hidden in screenshots,” the firm claimed. According to Kaspersky, apps infested with …
Kaspersky Discovers New Crypto-Stealing Trojan "SparkCat" in …
3 days ago · Kaspersky’s Threat Research expertise center has identified a new data-stealing Trojan, SparkCat, active in both the AppStore and Google Play since at least March 2024. This marks the first known case of optical recognition-based malware infiltrating the AppStore, raising significant concerns for mobile security.
Kaspersky: UAE users are targeted with a new crypto-stealing …
Kaspersky Threat Research expertise center has discovered a new data-stealing Trojan, SparkCat, active in AppStore and Google Play since at least March 2024. This is the first known instance of optical recognition-based malware appearing in AppStore. SparkCat uses machine learning to scan image galleries and steal screenshots containing …
SparkCat crypto stealer in Google Play and App Store
3 days ago · The malware, which we dubbed “SparkCat”, used an unidentified protocol implemented in Rust, a language untypical of mobile apps, to communicate with the C2. Judging by timestamps in malware files and creation dates of configuration files in GitLab repositories, SparkCat has been active since March 2024. A malware SDK in Google Play apps
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery …
2 days ago · SparkCat malware infects 242,000 Android devices, using OCR to steal crypto wallet phrases, marking the first iOS stealer on Apple’s App Store. ... (C2) server, Kaspersky researchers Dmitry Kalinin and Sergey Puzan said in a technical report. The moniker is a reference to an embedded software development kit (SDK) that employs a Java ...
Malware With Screen Reading Code Found in iOS Apps for the …
2 days ago · Dubbed "SparkCat," the malware includes OCR capabilities for sussing out sensitive information that an iPhone user has taken a screenshot of. The apps that Kaspersky discovered are aimed at ...
SparkCat campaign target crypto wallets using OCR to steal …
3 days ago · Kaspersky leaves U.S. market following the ban on the sale of its software in the country | FBI unlocked the phone of the suspect in the assassination attempt on Donald Trump | Ransomware groups target Veeam Backup & Replication bug | AT&T paid a $370,000 ransom to prevent stolen data from being leaked |
Kaspersky researchers find screenshot-reading malware on the
2 days ago · The Kaspersky duo said SparkCat is a stealthy operation that at a glance appears to be requesting normal or harmless permissions. Some of the apps where the pair uncovered malware are still ...
- Some results have been removed