Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Posted on June 24, 2025June 24, 2025 By CWS

Kaspersky has uncovered a spy ware marketing campaign concentrating on Android and iOS customers through official and unofficial app shops to steal photos from their gadgets, doubtlessly searching for cryptocurrency data.

Dubbed SparkKitty, the marketing campaign has been ongoing since early 2024 by means of functions injected with frameworks/SDKs, primarily concentrating on customers in Southeast Asia and China.

The malicious code, found in functions posing as TikTok mods for each Android and iOS, makes an attempt to steal the entire sufferer’s photos, however seems linked to a earlier marketing campaign that relied on optical character recognition (OCR) to extract cryptocurrency pockets data from screenshots.

To make sure the nefarious apps would run on iOS gadgets, the malware builders relied on a provisioning profile accessible by means of Apple’s Developer Program to deploy on victims’ iPhones certificates that might turn out to be trusted by the machine.

The attackers used an Enterprise profile, which permits organizations to push apps to consumer gadgets with out publishing them to Apple’s App Retailer, and a modified model of the AFNetworking open supply library, which gives assist for networking operations.

Searching for an Android counterpart, Kaspersky found a number of cryptocurrency and on line casino apps designed to steal photos from the machine’s gallery and ship them, together with machine data, to a command-and-control (C&C) server.

Digging deeper, the cybersecurity agency found {that a} messaging app with crypto alternate capabilities that had over 10,000 downloads in Google Play contained the malicious payload. The applying has been faraway from the official retailer.

One other contaminated Android app, distributed by means of unofficial sources, has an iOS counterpart that sneaked into the App Retailer. In each instances, the code was a part of the appliance, and never of a third-party SDK.Commercial. Scroll to proceed studying.

Kaspersky additionally found numerous internet pages distributing rip-off iOS apps within the PWA format, which resembled the pages providing the malicious TikTok apps, and which had been associated to numerous scams and Ponzi schemes.

A few of these PWA-containing pages additionally distributed Android functions that might request entry to learn the machine storage, after which use OCR to steal photos containing a phrase with a minimal of three letters.

In accordance with Kaspersky, not solely are these two clusters of malicious exercise linked, however in addition they appear linked to SparkCat, a chunk of spy ware that relied on OCR to steal from a tool’s gallery photos containing data associated to cryptocurrency wallets.

The identical as SparkKitty, the SparkCat marketing campaign relied on functions distributed by means of each official and unofficial software marketplaces.

Associated: FreeType Zero-Day Discovered by Meta Exploited in Paragon Adware Assaults

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Adware

Associated: North Korean Hackers Distributed Android Adware through Google Play

Associated: FireScam Android Malware Packs Infostealer, Adware Capabilities

Security Week News Tags:App, Apple, Google, PhotoStealing, Play, Sneaks, Spyware, Store

Post navigation

Previous Post: Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
Next Post: Chinese APT Hacking Routers to Build Espionage Infrastructure

Related Posts

ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions Security Week News
Australian Human Rights Commission Discloses Data Breach Security Week News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap Security Week News
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
Critical Vulnerability Patched in SAP NetWeaver Security Week News
Surge in Cyberattacks Targeting Journalists: Cloudflare Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News