Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play

Posted on June 23, 2025June 23, 2025 By CWS

Cybersecurity researchers have uncovered a complicated new spyware and adware marketing campaign referred to as SparkKitty that has efficiently infiltrated each Apple’s App Retailer and Google Play Retailer, marking a big escalation in cellular malware distribution by means of official channels.

Abstract
1. SparkKitty is a not too long ago uncovered malware that infects each iOS and Android gadgets by means of malicious apps within the App Retailer and Google Play.
2. Securelist analysts discovered that SparkKitty’s major aim is to steal all pictures from victims’ galleries, hoping to seize delicate information like crypto pockets phrases.
3. The malware makes use of disguised frameworks and obfuscated code for an infection and persistence, speaking with command servers to exfiltrate information.
4. The marketing campaign has focused customers primarily in Southeast Asia and China since early 2024 and stays lively, posing severe privateness and monetary dangers.

This Trojan spy represents the newest evolution in cryptocurrency-focused assaults, constructing upon the beforehand found SparkCat marketing campaign whereas increasing its attain throughout each main cellular platforms.

The malware demonstrates outstanding versatility in its assault vectors, spreading not solely by means of official app shops but in addition through unofficial sources and modified purposes.

iOS app obtain web page (Supply – Securelist)

SparkKitty targets each iOS and Android gadgets concurrently, using platform-specific methods to bypass safety measures and set up persistent entry to sufferer gadgets.

Profile set up circulate (Supply – Securelist)

The marketing campaign has been lively since not less than February 2024, indicating a sustained and coordinated effort by risk actors to compromise cellular customers globally.

Securelist researchers famous that SparkKitty employs a number of distribution strategies to maximise its an infection potential.

On iOS gadgets, the malicious payload is delivered by means of frameworks that mimic respectable networking libraries reminiscent of AFNetworking.framework or Alamofire.framework, whereas additionally using obfuscated libraries disguised as system parts like libswiftDarwin.dylib.

Suspicious retailer opened inside a TikTok app (Supply – Securelist)

The Android variant operates by means of each Java and Kotlin implementations, with some variations functioning as malicious Xposed modules that hook into utility entry factors.

Contaminated app on Google Play (Supply – Securelist)

The first goal of SparkKitty seems to be the theft of pictures saved on contaminated gadgets, with specific deal with pictures containing cryptocurrency pockets seed phrases.

In contrast to its predecessor SparkCat, which used optical character recognition to selectively goal particular content material, SparkKitty adopts a extra complete strategy by indiscriminately stealing all accessible pictures from system galleries.

This broader assortment technique suggests the attackers are casting a wider web to seize doubtlessly priceless monetary info.

The marketing campaign has demonstrated appreciable geographic focus, primarily concentrating on customers in Southeast Asia and China by means of purposes particularly designed for these areas, together with Chinese language playing video games, TikTok modifications, and adult-oriented purposes.

This regional concentrating on aligns with the cryptocurrency themes embedded inside most of the contaminated purposes, suggesting the risk actors possess intimate information of their supposed sufferer demographics.

Technical Implementation and Persistence Mechanisms

The technical sophistication of SparkKitty turns into obvious when analyzing its implementation particulars throughout each platforms.

On iOS gadgets, the malware leverages Goal-C’s computerized class loading mechanism by means of the particular load selector, which executes mechanically when purposes launch.

The entry level for malicious exercise happens inside the modified +[AFImageDownloader load] selector, a operate that doesn’t exist in respectable AFNetworking implementations.

The malware implements a multi-stage verification course of earlier than activating its payload. It first checks whether or not the ccool key within the utility’s Data.plist configuration file matches the precise string 77e1a4d360e17fdbc.

This serves as an preliminary authentication mechanism to stop unintentional execution in unintended environments.

Following profitable verification, SparkKitty retrieves and decrypts a Base64-encoded configuration from the ccc key utilizing AES-256 encryption in ECB mode with the hardcoded key p0^tWut=pswHL-x>>:m?^.^)W.

The decrypted configuration incorporates command and management server addresses that facilitate the exfiltration course of.

Earlier than starting picture theft operations, the malware establishes communication with its C2 infrastructure by means of a GET request to the /api/getImageStatus endpoint, transmitting utility particulars and consumer identification info.

The server responds with a JSON construction containing authorization codes that decide whether or not picture importing ought to proceed.

As soon as licensed, SparkKitty systematically accesses the system’s picture gallery, maintains a neighborhood database of beforehand stolen pictures, and uploads new pictures to the /api/putImages endpoint utilizing multipart type information transmission.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Android, App, Attacks, Devices, Google, IOS, Play, SparkKitty, Store, Wild

Post navigation

Previous Post: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
Next Post: US Braces for Cyberattacks After Joining Israel-Iran War

Related Posts

Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Future of Passwords Biometrics and Passwordless Authentication Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details Cyber Security News
Golden SAML Attack Let Attackers Gains Control of The Private Keyused by Federation Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese APT Hacking Routers to Build Espionage Infrastructure
  • Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
  • Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
  • U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
  • WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Chinese APT Hacking Routers to Build Espionage Infrastructure
  • Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play
  • Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
  • U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
  • WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News