Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan was discovered targeting both the mobile operating systems. The malware has been found to conceal itself within seemingly benign apps, such as enterprise messengers and food delivery services, while silently scanning victims' photo galleries for cryptocurrency wallet recovery phrases. Russian cybersecurity company Kaspersky said it found two infected apps on the App Store and one on the Google Play Store that primarily target cryptocurrency users in Asia. "The iOS variant, however, takes a different approach as it scans for cryptocurrency wallet mnemonic phrases, which are in English," the company said. "This makes the iOS variant potentially broader in reach, as it can affect users regardless of their region."
This represents a significant evolution in mobile crypto threats, with attackers successfully infiltrating official app stores to distribute malware designed specifically to steal cryptocurrency wallet seed phrases. The malware's ability to hide within legitimate-appearing applications makes it particularly dangerous for unsuspecting users who download apps from what they believe are trusted sources.
