Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New SparkCat Malware Targets Crypto Wallets on Mobile Apps

New SparkCat Malware Targets Crypto Wallets on Mobile Apps

Posted on April 3, 2026 By CWS

Cybersecurity experts have reported the emergence of a new variant of the SparkCat malware, found in mobile applications available on both the Apple App Store and Google Play Store. This discovery comes over a year after the initial identification of SparkCat, which targeted mobile operating systems. The malware is designed to surreptitiously scan users’ photo galleries for images containing cryptocurrency wallet recovery phrases, posing a significant threat to mobile security.

Hidden Threat in Common Apps

SparkCat conceals itself within seemingly harmless applications such as enterprise communication tools and food delivery services. This tactic allows it to operate unnoticed while targeting cryptocurrency users, particularly in Asia. According to Russian cybersecurity firm Kaspersky, two infected apps were identified on the App Store and one on the Google Play Store, all primarily focused on Asian markets.

The iOS version of SparkCat differs in its approach by scanning for mnemonic phrases in English, potentially expanding its reach to affect users globally. This broadens the scope of the threat beyond regional boundaries, making international users vulnerable.

Advanced Features in the Android Variant

The latest iteration of SparkCat for Android introduces multiple layers of obfuscation, improving its stealth capabilities. This includes techniques such as code virtualization and the use of cross-platform programming languages, complicating efforts to analyze and counter the threat. Additionally, the Android version is tailored to search for keywords in Japanese, Korean, and Chinese, reinforcing its focus on Asian cryptocurrency users.

Initially documented by Kaspersky in February 2025, SparkCat was notable for its use of an optical character recognition (OCR) model to extract images containing recovery phrases from users’ photo libraries and send them to a remote server under the attackers’ control.

Ongoing Threat and Developer Insights

The continual evolution of SparkCat highlights the sophistication and ongoing efforts of its developers. Kaspersky researchers, including Sergey Puzan, emphasize that the updated variant retains the capability to request access to smartphone photo galleries. Utilizing an OCR module, it analyzes text within stored images, sending any with relevant keywords to the attackers. The similarities between current and previous versions suggest the same developers are behind this malware campaign.

This development underscores the critical need for robust security measures on smartphones to protect against diverse cyber threats. Users are advised to employ comprehensive security solutions to safeguard their devices from such evolving threats.

The Hacker News Tags:Android, Cryptocurrency, Cybersecurity, IOS, Kaspersky, Malware, mobile security, OCR, SparkCat, threat intelligence

Post navigation

Previous Post: Top Linux VPNs for 2026: Ensure Privacy and Security
Next Post: Microsoft Automates Windows 11 25H2 Upgrade Rollout

Related Posts

Google Pays .375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The Hacker News
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP The Hacker News
CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • T-Mobile Clarifies Impact of Recent Data Breach
  • Drift Faces $285M Loss in Social Engineering Heist
  • Microsoft Automates Windows 11 25H2 Upgrade Rollout
  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • T-Mobile Clarifies Impact of Recent Data Breach
  • Drift Faces $285M Loss in Social Engineering Heist
  • Microsoft Automates Windows 11 25H2 Upgrade Rollout
  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark