Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Posted on June 24, 2025June 24, 2025 By CWS

Kaspersky has uncovered a spy ware marketing campaign concentrating on Android and iOS customers through official and unofficial app shops to steal photos from their gadgets, doubtlessly searching for cryptocurrency data.

Dubbed SparkKitty, the marketing campaign has been ongoing since early 2024 by means of functions injected with frameworks/SDKs, primarily concentrating on customers in Southeast Asia and China.

The malicious code, found in functions posing as TikTok mods for each Android and iOS, makes an attempt to steal the entire sufferer’s photos, however seems linked to a earlier marketing campaign that relied on optical character recognition (OCR) to extract cryptocurrency pockets data from screenshots.

To make sure the nefarious apps would run on iOS gadgets, the malware builders relied on a provisioning profile accessible by means of Apple’s Developer Program to deploy on victims’ iPhones certificates that might turn out to be trusted by the machine.

The attackers used an Enterprise profile, which permits organizations to push apps to consumer gadgets with out publishing them to Apple’s App Retailer, and a modified model of the AFNetworking open supply library, which gives assist for networking operations.

Searching for an Android counterpart, Kaspersky found a number of cryptocurrency and on line casino apps designed to steal photos from the machine’s gallery and ship them, together with machine data, to a command-and-control (C&C) server.

Digging deeper, the cybersecurity agency found {that a} messaging app with crypto alternate capabilities that had over 10,000 downloads in Google Play contained the malicious payload. The applying has been faraway from the official retailer.

One other contaminated Android app, distributed by means of unofficial sources, has an iOS counterpart that sneaked into the App Retailer. In each instances, the code was a part of the appliance, and never of a third-party SDK.Commercial. Scroll to proceed studying.

Kaspersky additionally found numerous internet pages distributing rip-off iOS apps within the PWA format, which resembled the pages providing the malicious TikTok apps, and which had been associated to numerous scams and Ponzi schemes.

A few of these PWA-containing pages additionally distributed Android functions that might request entry to learn the machine storage, after which use OCR to steal photos containing a phrase with a minimal of three letters.

In accordance with Kaspersky, not solely are these two clusters of malicious exercise linked, however in addition they appear linked to SparkCat, a chunk of spy ware that relied on OCR to steal from a tool’s gallery photos containing data associated to cryptocurrency wallets.

The identical as SparkKitty, the SparkCat marketing campaign relied on functions distributed by means of each official and unofficial software marketplaces.

Associated: FreeType Zero-Day Discovered by Meta Exploited in Paragon Adware Assaults

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Adware

Associated: North Korean Hackers Distributed Android Adware through Google Play

Associated: FireScam Android Malware Packs Infostealer, Adware Capabilities

Security Week News Tags:App, Apple, Google, PhotoStealing, Play, Sneaks, Spyware, Store

Post navigation

Previous Post: Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
Next Post: Chinese APT Hacking Routers to Build Espionage Infrastructure

Related Posts

160,000 Impacted by Valsoft Data Breach Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Open Source CISA Tool Helps Defenders With Hacker Containment, Eviction Security Week News
Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
Law Firms Warned of Silent Ransom Group Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets
  • Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email
  • CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials
  • Multiple 0-days to Bypass BitLocker and Extract All Protected Data
  • DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets
  • Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email
  • CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials
  • Multiple 0-days to Bypass BitLocker and Extract All Protected Data
  • DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News