Binance Square

SparkKitty

700 views
6 Discussing
Xahoor Baba
--
#CryptoScam 🚨🚨🚨🚨🚨🔥🔥 🔥🔥🚨🚨How the #Saprkkitty Trojan is Stealing Crypto Wallet Data from Phones.📢📢 🔥🚨A newly discovered Trojan dubbed #SparkKitty is infecting smartphones and siphoning off sensitive data, potentially enabling attackers to drain victims' cryptocurrency wallets, cybersecurity firm Kaspersky said in a report on Tuesday.✅ 🚨The malware is embedded in apps related to crypto trading, gambling, and even modified versions of TikTok.✅ 🚨Once installed via deceptive provisioning profiles—used for running iOS apps or modified apps—SparkKitty requests access to the photo gallery. It monitors for changes, creates a local database of stolen images, and uploads photos to a remote server.✅ 🚨We suspect the attackers’ main goal is to find screenshots of crypto wallet seed phrases, Kaspersky said.✅ 🚨Currently, the malware primarily targets victims in China and Southeast Asia. However, the firm warned that there was nothing to stop it from spreading to other regions.✅ 🚨In its 2024 report, TRM Labs estimated that nearly 70% of the $2.2 billion in stolen crypto last year resulted from infrastructure attacks, particularly those involving the theft of private keys and seed phrases.✅
#CryptoScam 🚨🚨🚨🚨🚨🔥🔥

🔥🔥🚨🚨How the #Saprkkitty Trojan is Stealing Crypto Wallet Data from Phones.📢📢

🔥🚨A newly discovered Trojan dubbed #SparkKitty is infecting smartphones and siphoning off sensitive data, potentially enabling attackers to drain victims' cryptocurrency wallets, cybersecurity firm Kaspersky said in a report on Tuesday.✅

🚨The malware is embedded in apps related to crypto trading, gambling, and even modified versions of TikTok.✅

🚨Once installed via deceptive provisioning profiles—used for running iOS apps or modified apps—SparkKitty requests access to the photo gallery. It monitors for changes, creates a local database of stolen images, and uploads photos to a remote server.✅

🚨We suspect the attackers’ main goal is to find screenshots of crypto wallet seed phrases, Kaspersky said.✅

🚨Currently, the malware primarily targets victims in China and Southeast Asia. However, the firm warned that there was nothing to stop it from spreading to other regions.✅

🚨In its 2024 report, TRM Labs estimated that nearly 70% of the $2.2 billion in stolen crypto last year resulted from infrastructure attacks, particularly those involving the theft of private keys and seed phrases.✅
Sparkkitty Searches for Crypto Seed Phrases in Screenshots According to SlowMist and Kaspersky, #SparkKitty steals media files to scavenge for crypto wallet seed phrases. In a report, Sergey Puzan and Dmitry Kalinin, analysts from Kaspersky, noted that the targets for the malware are infected iOS and Android devices. It spreads on these devices by hiding within certain apps available on the Apple App Store and Google Play Store. More specifically, Puzan and Kalinin believe that screenshots of crypto wallet seed phrases and other sensitive data are SparkKitty’s main media files of interest. SparkCat employed the same tactics, which Kaspersky identified in an investigation in January. The malware appears to have no regional boundaries, though users in Southeast Asia and China seem to be the most frequently targeted. 币coin, a supposed crypto information tracker on the App Store, and #SOEX are two apps identified to deliver the SparkKitty malware. SOEX is a messaging app with “crypto exchange features” on Google Play. What they both have in common is the fact that they focus on digital assets. SparkKitty was discovered to have been delivered through casino apps, adult-themed games, and malicious TikTok clones. Kaspersky analysts revealed that the SOEX app had been uploaded to Google Play and downloaded more than 10,000 times. After being notified, Google removed the app from the store and blacklisted its developer. According to a Google spokesperson, “Android users are automatically protected against this app regardless of download source by Google Play Protect, which is on by default on Android devices with Google Play Services.” In the past, Google has taken similar actions against suspicious apps. For example, two years ago, the Chinese e-commerce app Pinduoduo was suspended after malware was found in unauthorized versions of the software.
Sparkkitty Searches for Crypto Seed Phrases in Screenshots

According to SlowMist and Kaspersky, #SparkKitty steals media files to scavenge for crypto wallet seed phrases. In a report, Sergey Puzan and Dmitry Kalinin, analysts from Kaspersky, noted that the targets for the malware are infected iOS and Android devices. It spreads on these devices by hiding within certain apps available on the Apple App Store and Google Play Store.

More specifically, Puzan and Kalinin believe that screenshots of crypto wallet seed phrases and other sensitive data are SparkKitty’s main media files of interest. SparkCat employed the same tactics, which Kaspersky identified in an investigation in January.

The malware appears to have no regional boundaries, though users in Southeast Asia and China seem to be the most frequently targeted.

币coin, a supposed crypto information tracker on the App Store, and #SOEX are two apps identified to deliver the SparkKitty malware.

SOEX is a messaging app with “crypto exchange features” on Google Play. What they both have in common is the fact that they focus on digital assets.

SparkKitty was discovered to have been delivered through casino apps, adult-themed games, and malicious TikTok clones.

Kaspersky analysts revealed that the SOEX app had been uploaded to Google Play and downloaded more than 10,000 times. After being notified, Google removed the app from the store and blacklisted its developer.

According to a Google spokesperson, “Android users are automatically protected against this app regardless of download source by Google Play Protect, which is on by default on Android devices with Google Play Services.”

In the past, Google has taken similar actions against suspicious apps. For example, two years ago, the Chinese e-commerce app Pinduoduo was suspended after malware was found in unauthorized versions of the software.
🚨 New Crypto Malware “SparkKitty” Steals Mnemonic Screenshots Kaspersky has identified a new mobile virus SparkKitty, targeting iOS & Android crypto apps by scanning users’ photo albums for seed phrase screenshots. 📱 Affected apps include: “币 coin” on App Store SOEX chat app (10K+ downloads on Google Play) 🔍 Linked to SparkCat, active since early 2024, mainly targeting users in Southeast Asia & China. ⚠️ Never screenshot your seed phrase. Clean your photo albums & avoid unknown apps! #SparkKitty #CryptoMalware
🚨 New Crypto Malware “SparkKitty” Steals Mnemonic Screenshots

Kaspersky has identified a new mobile virus SparkKitty, targeting iOS & Android crypto apps by scanning users’ photo albums for seed phrase screenshots.

📱 Affected apps include:

“币 coin” on App Store

SOEX chat app (10K+ downloads on Google Play)

🔍 Linked to SparkCat, active since early 2024, mainly targeting users in Southeast Asia & China.

⚠️ Never screenshot your seed phrase. Clean your photo albums & avoid unknown apps!

#SparkKitty #CryptoMalware
See original
See original
🚨 Urgent Warning: A new malware called SparkKitty is stealing secret phrase images from smartphones! ━━━━━━━━━━━━━━━ 🧠 What is happening? – Kaspersky security company warned about the spread of a new malware called SparkKitty – It targets phones through crypto-themed applications on iOS and Android ━━━━━━━━━━━━━━━ 📸 How does the hack work? – The malware steals stored screenshots on the phone – It specifically focuses on images of recovery phrases related to digital wallets ━━━━━━━━━━━━━━━ 📱 Where does the malware hide? – Inside applications that seem legitimate and are related to crypto or trading – It spreads through external stores or even fake links sent to users ━━━━━━━━━━━━━━━ 🛡️ How to protect yourself? – Never take pictures of recovery phrases – Do not trust any unofficial or untrusted application – Use modern antivirus software, and review application permissions ━━━━━━━━━━━━━━━ ❗️The secret phrase is your only key to your wallet – do not put it at risk in any way ━━━━━━━━━━━━━━━ 📍 If you liked the content, support me with a like and follow to get all the latest LEGENDARY_007 #CryptoNewss #LEGENDARY_007 #SparkKitty #SecurityAlert
🚨 Urgent Warning: A new malware called SparkKitty is stealing secret phrase images from smartphones!
━━━━━━━━━━━━━━━

🧠 What is happening?
– Kaspersky security company warned about the spread of a new malware called SparkKitty
– It targets phones through crypto-themed applications on iOS and Android
━━━━━━━━━━━━━━━

📸 How does the hack work?
– The malware steals stored screenshots on the phone
– It specifically focuses on images of recovery phrases related to digital wallets
━━━━━━━━━━━━━━━

📱 Where does the malware hide?
– Inside applications that seem legitimate and are related to crypto or trading
– It spreads through external stores or even fake links sent to users
━━━━━━━━━━━━━━━

🛡️ How to protect yourself?
– Never take pictures of recovery phrases
– Do not trust any unofficial or untrusted application
– Use modern antivirus software, and review application permissions
━━━━━━━━━━━━━━━

❗️The secret phrase is your only key to your wallet – do not put it at risk in any way
━━━━━━━━━━━━━━━

📍 If you liked the content, support me with a like and follow to get all the latest
LEGENDARY_007

#CryptoNewss #LEGENDARY_007 #SparkKitty #SecurityAlert
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number