
Beware: SparkKitty malware wants your seed phrase screenshots
Cybersecurity firm Kaspersky has warned of a newly discovered malware known as SparkKitty, which steals photos from infected devices in the hopes of finding crypto seed phrases.Kaspersky analysts Sergey Puzan and Dmitry Kalinin said in a report on Monday that SparkKitty is targeting both iOS and Android devices by infiltrating some of the apps on the Apple App Store and Google Play.Once a device is infected, the malicious software indiscriminately steals all images in the photo gallery.âAlthough we suspect the attackersâ main goal is to find screenshots of crypto wallet seed phrases, other sensitive data could also be present in the stolen images.âMalicious apps focus on crypto themesTwo apps used to deliver the malware found by Kaspersky focused on crypto. One known as ĺ¸coin, which markets itself as a crypto information tracker, was on the App Store.The second was SOEX, a messaging app with âcrypto exchange featuresâ on Google Play. âThis app was uploaded to Google Play and installed over 10,000 times. We notified Google about it, and they removed the app from the store,â Puzan and Kalinin said.A Google spokesperson confirmed to Cointelegraph that the app had been removed from Google Play, and the developer was banned. âAndroid users are automatically protected against this app regardless of download source by Google Play Protect, which is on by default on Android devices with Google Play Services,â the spokesperson said. The Kaspersky analysts also discovered instances of SparkKitty being delivered through casino apps, adult-themed games and malicious TikTok clones.SparkCatâs little brotherThe malware is similar to SparkCat, which was identified during a Kaspersky investigation in January. The malware scans usersâ pictures to find crypto wallet recovery phrases. Both versions of the malware are likely from the same source, Puzan and Kalinin said, because they share similar features and include similar file paths from the attackersâ systems.âWhile not technically or conceptually complex, this campaign has been ongoing since at least the beginning of 2024 and poses a significant threat to users,â Puzan and Kalinin said.âUnlike the previously discovered SparkCat spyware, this malware isnât picky about which photos it steals from the gallery.âSoutheast Asia and China main targetsThe main targets of this malware campaign are users in Southeast Asia and China, based on Kasperskyâs findings, as the infected apps include various Chinese gambling games, TikTok and adult games.âJudging by the distribution sources, this spyware primarily targets users in Southeast Asia and China,â Puzan and Kalinin said.âHowever, it doesnât have any technical limitations that would prevent it from attacking users in other regions,â they added.Â