Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play

Posted on June 24, 2025June 24, 2025 By CWS

Kaspersky has uncovered a spy ware marketing campaign concentrating on Android and iOS customers through official and unofficial app shops to steal photos from their gadgets, doubtlessly searching for cryptocurrency data.

Dubbed SparkKitty, the marketing campaign has been ongoing since early 2024 by means of functions injected with frameworks/SDKs, primarily concentrating on customers in Southeast Asia and China.

The malicious code, found in functions posing as TikTok mods for each Android and iOS, makes an attempt to steal the entire sufferer’s photos, however seems linked to a earlier marketing campaign that relied on optical character recognition (OCR) to extract cryptocurrency pockets data from screenshots.

To make sure the nefarious apps would run on iOS gadgets, the malware builders relied on a provisioning profile accessible by means of Apple’s Developer Program to deploy on victims’ iPhones certificates that might turn out to be trusted by the machine.

The attackers used an Enterprise profile, which permits organizations to push apps to consumer gadgets with out publishing them to Apple’s App Retailer, and a modified model of the AFNetworking open supply library, which gives assist for networking operations.

Searching for an Android counterpart, Kaspersky found a number of cryptocurrency and on line casino apps designed to steal photos from the machine’s gallery and ship them, together with machine data, to a command-and-control (C&C) server.

Digging deeper, the cybersecurity agency found {that a} messaging app with crypto alternate capabilities that had over 10,000 downloads in Google Play contained the malicious payload. The applying has been faraway from the official retailer.

One other contaminated Android app, distributed by means of unofficial sources, has an iOS counterpart that sneaked into the App Retailer. In each instances, the code was a part of the appliance, and never of a third-party SDK.Commercial. Scroll to proceed studying.

Kaspersky additionally found numerous internet pages distributing rip-off iOS apps within the PWA format, which resembled the pages providing the malicious TikTok apps, and which had been associated to numerous scams and Ponzi schemes.

A few of these PWA-containing pages additionally distributed Android functions that might request entry to learn the machine storage, after which use OCR to steal photos containing a phrase with a minimal of three letters.

In accordance with Kaspersky, not solely are these two clusters of malicious exercise linked, however in addition they appear linked to SparkCat, a chunk of spy ware that relied on OCR to steal from a tool’s gallery photos containing data associated to cryptocurrency wallets.

The identical as SparkKitty, the SparkCat marketing campaign relied on functions distributed by means of each official and unofficial software marketplaces.

Associated: FreeType Zero-Day Discovered by Meta Exploited in Paragon Adware Assaults

Associated: Google Ships Android ‘Superior Safety’ Mode to Thwart Surveillance Adware

Associated: North Korean Hackers Distributed Android Adware through Google Play

Associated: FireScam Android Malware Packs Infostealer, Adware Capabilities

Security Week News Tags:App, Apple, Google, PhotoStealing, Play, Sneaks, Spyware, Store

Post navigation

Previous Post: Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
Next Post: Chinese APT Hacking Routers to Build Espionage Infrastructure

Related Posts

Ransomware Attack Forces Kettering Health to Cancel Procedures Security Week News
CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
Counter Antivirus Service AVCheck Shut Down by Law Enforcement Security Week News
FBI Aware of 900 Organizations Hit by Play Ransomware Security Week News
Circumvent Raises $6 Million for Cloud Security Platform Security Week News
Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • Siemens Notifies Customers of Microsoft Defender Antivirus Issue
  • Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
  • Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • Siemens Notifies Customers of Microsoft Defender Antivirus Issue
  • Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
  • Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News