Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SparkKitty Malware Attacking iOS and Android Users to Steal Gallery Images

Posted on July 9, 2025July 9, 2025 By CWS

A complicated Trojan malware often called SparkKitty has been actively focusing on iOS and Android units since early 2024, infiltrating each official app shops and untrusted web sites to steal pictures from customers’ system galleries.

This malware marketing campaign, which seems to be an evolution of the earlier SparkCat operation, poses vital threats to customers primarily in Southeast Asia and China by indiscriminately exfiltrating private photographs with a suspected concentrate on capturing cryptocurrency pockets seed phrases and different delicate visible knowledge.

SparkKitty has demonstrated exceptional sophistication in its distribution strategies, efficiently bypassing app retailer vetting processes to succeed in customers by means of seemingly official channels.

The malware has been found embedded in purposes accessible on Google Play Retailer and Apple’s App Retailer, together with apps like 币coin (a cryptocurrency tracker) and SOEX (a messaging platform with cryptocurrency buying and selling options).

The SOEX app alone garnered over 10,000 downloads earlier than its removing from Google Play, highlighting the malware’s potential to realize widespread distribution by means of trusted platforms.

On iOS units, SparkKitty exploits enterprise provisioning profiles, that are designed for company app distribution however may be abused to sideload malicious purposes outdoors Apple’s commonplace assessment course of.

This method permits the malware to bypass conventional safety measures and attain customers who Apple’s curated app ecosystem would possibly in any other case shield.

Technical Capabilities and Execution

The malware demonstrates platform-specific execution methods whereas sustaining constant stealth capabilities throughout each working methods.

SparkKitty Android variants are developed utilizing Java and Kotlin programming languages, with some variations leveraging malicious Xposed modules to inject code into trusted purposes.

These variants activate upon app launch or particular consumer interactions, subsequently requesting storage permissions to entry system pictures.

For iOS units, SparkKitty makes use of Goal-C’s computerized class loading mechanism by means of the +[AFImageDownloader load] selector, which triggers instantly upon app launch.

The malware incorporates refined verification checks to make sure execution solely happens in meant environments, inspecting the app’s Information.plist file for particular configuration keys earlier than continuing with its malicious actions.

Not like its predecessor, SparkCat, which employed optical character recognition (OCR) expertise to selectively goal particular pictures, SparkKitty adopts a extra aggressive strategy by exfiltrating all accessible photographs from system galleries.

This complete knowledge theft technique considerably will increase the probability of capturing delicate data, together with cryptocurrency pockets seed phrases, private identification paperwork, and monetary information.

The malware maintains a neighborhood database to trace beforehand uploaded pictures and repeatedly displays gallery adjustments to steal newly added content material.

As soon as collected, pictures are uploaded to command-and-control servers by way of the ‘/api/putImages’ endpoint, using cloud infrastructure together with AWS S3 and Alibaba OSS for payload supply and knowledge exfiltration.

Geographic Focusing on and Person Impression

SparkKitty’s marketing campaign seems strategically targeted on customers in Southeast Asia and China, aligning with purposes particularly tailor-made for these regional audiences.

The malware has been found in apps associated to cryptocurrency, playing, and grownup leisure, together with trojanized TikTok modifications, suggesting deliberate focusing on of high-risk software verticals the place customers could be extra more likely to retailer delicate visible data.

The emergence of SparkKitty represents a major escalation in cellular malware sophistication, demonstrating how menace actors can efficiently infiltrate trusted app distribution channels.

Customers ought to train excessive warning when downloading purposes, notably these associated to cryptocurrency or monetary companies, and keep away from storing delicate screenshots in system galleries.

The malware’s potential to bypass each Google Play and App Retailer safety measures underscores the essential want for enhanced cellular safety consciousness and protecting measures.

IoC’s

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

Be taught what managed safety companies actually price and methods to keep away from overpaying for restricted safety => Obtain Information

Cyber Security News Tags:Android, Attacking, Gallery, Images, IOS, Malware, SparkKitty, Steal, Users

Post navigation

Previous Post: Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges
Next Post: How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Related Posts

Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Building a Scalable Cybersecurity Training Program Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory
  • MathWorks Confirms Cyberattack, User Personal Information Stolen

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory
  • MathWorks Confirms Cyberattack, User Personal Information Stolen

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News