Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Posted on June 24, 2025June 24, 2025 By CWS

Kaspersky has uncovered a spy ware marketing campaign concentrating on Android and iOS customers through official and unofficial app shops to steal photos from their gadgets, doubtlessly searching for cryptocurrency data.

Dubbed SparkKitty, the marketing campaign has been ongoing since early 2024 by means of functions injected with frameworks/SDKs, primarily concentrating on customers in Southeast Asia and China.

The malicious code, found in functions posing as TikTok mods for each Android and iOS, makes an attempt to steal the entire sufferer’s photos, however seems linked to a earlier marketing campaign that relied on optical character recognition (OCR) to extract cryptocurrency pockets data from screenshots.

To make sure the nefarious apps would run on iOS gadgets, the malware builders relied on a provisioning profile accessible by means of Apple’s Developer Program to deploy on victims’ iPhones certificates that might turn out to be trusted by the machine.

The attackers used an Enterprise profile, which permits organizations to push apps to consumer gadgets with out publishing them to Apple’s App Retailer, and a modified model of the AFNetworking open supply library, which gives assist for networking operations.

Searching for an Android counterpart, Kaspersky found a number of cryptocurrency and on line casino apps designed to steal photos from the machine’s gallery and ship them, together with machine data, to a command-and-control (C&C) server.

Digging deeper, the cybersecurity agency found {that a} messaging app with crypto alternate capabilities that had over 10,000 downloads in Google Play contained the malicious payload. The applying has been faraway from the official retailer.

One other contaminated Android app, distributed by means of unofficial sources, has an iOS counterpart that sneaked into the App Retailer. In each instances, the code was a part of the appliance, and never of a third-party SDK.Commercial. Scroll to proceed studying.

Kaspersky additionally found numerous internet pages distributing rip-off iOS apps within the PWA format, which resembled the pages providing the malicious TikTok apps, and which had been associated to numerous scams and Ponzi schemes.

A few of these PWA-containing pages additionally distributed Android functions that might request entry to learn the machine storage, after which use OCR to steal photos containing a phrase with a minimal of three letters.

In accordance with Kaspersky, not solely are these two clusters of malicious exercise linked, however in addition they appear linked to SparkCat, a chunk of spy ware that relied on OCR to steal from a tool’s gallery photos containing data associated to cryptocurrency wallets.

The identical as SparkKitty, the SparkCat marketing campaign relied on functions distributed by means of each official and unofficial software marketplaces.

Associated: FreeType Zero-Day Discovered by Meta Exploited in Paragon Adware Assaults

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Adware

Associated: North Korean Hackers Distributed Android Adware through Google Play

Associated: FireScam Android Malware Packs Infostealer, Adware Capabilities

Security Week News Tags:App, Apple, Google, PhotoStealing, Play, Sneaks, Spyware, Store

Post navigation

Previous Post: Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
Next Post: Chinese APT Hacking Routers to Build Espionage Infrastructure

Related Posts

In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach Security Week News
Adobe Patches Critical Code Execution Bugs Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
Maze Banks $25M to Tackle Cloud Security with AI Agents Security Week News
1Kosmos Raises $57 Million for Identity Verification and Authentication Platform Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack
  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 
  • SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack
  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 
  • SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News