https://cairoict.com/trade-visitor-registration/ https://cairoict.com/trade-visitor-registration/ https://cairoict.com/trade-visitor-registration/
الإثنين, 11 مايو, 2026
سياسة الخصوصية
من نجن
No Result
View All Result
  • آخر الأخبار
  • أمن إلكتروني
  • خدمات مالية
  • تقنيات ومنصات
  • ريادة أعمال
  • عالم الألعاب
  • مدن المستقبل
  • أحدث المنتجات
  • ترند
  • English
Techno fin
No Result
View All Result
  • آخر الأخبار
  • أمن إلكتروني
  • خدمات مالية
  • تقنيات ومنصات
  • ريادة أعمال
  • عالم الألعاب
  • مدن المستقبل
  • أحدث المنتجات
  • ترند
  • English

Kaspersky: UAE Users Targeted by New Crypto-Stealing Trojan

by تكنو فن
فبراير 5, 2025
Reading Time: 5 mins read
A A
Kaspersky: UAE Users Targeted by New Crypto-Stealing Trojan
Kaspersky Threat Research expertise center has discovered a new data-stealing Trojan, SparkCat, active in AppStore and Google Play since at least March 2024. This is the first known instance of optical recognition-based malware appearing in AppStore. SparkCat uses machine learning to scan image galleries and steal screenshots containing cryptocurrency wallet recovery phrases. It can also find and extract other sensitive data in images, such as passwords.
Kaspersky has reported known malicious applications to Google and Apple.

How the new malware spreads

The malware is spreading through both infected legitimate apps and lures – messengers, AI assistants, food delivery, crypto-related apps, and more. Some of these apps are available on official platforms in Google Play and AppStore. Kaspersky telemetry data also shows that infected versions are being distributed through other unofficial sources. In Google Play, these apps have been downloaded over 242,000 times.

Who is being targeted

The malware primarily targets users in the UAE and countries in Europe and Asia. This is what experts concluded based on both the information about the operational areas of the infected apps and the technical analysis of the malware. SparkCat scans image galleries for keywords in multiple languages, including Chinese, Japanese, Korean, English, Czech, French, Italian, Polish, and Portuguese. However, experts believe victims could be from other countries as well.
For example, the food delivery app ComeCome for iOS was infected, just like its Android version.

How SparkCat works

Once installed, in certain scenarios the new malware requests access to view photos in a user’s smartphone gallery. It then analyzes the text in stored images using an optical character recognition (OCR) module. If the stealer detects relevant keywords, it sends the image to the attackers. The hackers’ primary goal is to find recovery phrases for cryptocurrency wallets. With this information, they can gain full control over a victim’s wallet and steal funds. Beyond stealing recovery phrases, the malware is capable of extracting other personal information from screenshots, such as messages and passwords.
“This is the first known case of OCR-based Trojan to sneak into AppStore,” said Sergey Puzan, malware analyst at Kaspersky. “In terms of both AppStore and Google Play, at the moment it’s unclear whether applications in these stores were compromised through a supply chain attack or through various other methods. Some apps, like food delivery services, appear legitimate, while others are clearly designed as lures.”
“The SparkCat campaign has some unique features that make it dangerous. First of all, it spreads through official app stores and operates without obvious signs of infection. The stealthiness of this Trojan makes it hard to discover it for both store moderators and mobile users. Also, the permissions it requests seem reasonable, making them easy to overlook. Access to the gallery that the malware attempts to reach may seem essential for the app to function properly, as it appears from the user perspective. This permission is typically requested in relevant contexts, such as when users contact customer support,” added Dmitry Kalinin, malware analyst at Kaspersky.
Analyzing Android versions of the malware, Kaspersky experts found comments in the code written in Chinese. Additionally, the iOS version contained developer home directory names, “qiongwu” and “quiwengjing”, suggesting that the threat actors behind the campaign are fluent in Chinese. However, there is not enough evidence to attribute the campaign to a known cybercriminal group.

ML-powered attacks

Cybercriminals are increasingly paying attention to neural networks in their nefarious tools. In the case of SparkCat, the Android module decrypts and executes an OCR-plugin using the Google ML Kit library to recognize text in stored images. A similar method was used in its iOS malicious module.
Kaspersky solutions protect both Android and iOS users from SparkCat. It is detected as HEUR:Trojan.IphoneOS.SparkCat.* and HEUR:Trojan.AndroidOS.SparkCat.*.
A full report on this malware campaign is available at Securelist.
To avoid becoming a victim of this malware, Kaspersky recommends the following safety measures:
● If you have installed one of the infected applications, remove it from your device and do not use it until an update has been released to eliminate the malicious functionality.
● Avoid storing screenshots containing sensitive information in your gallery, including cryptocurrency wallet recovery phrases. Passwords, for example, could be stored in specialized applications such as Kaspersky Password Manager.
● Reliable cybersecurity software, like Kaspersky Premium, can prevent malware infections.

شارك هذا الموضوع

  • المشاركة على WhatsApp (فتح في نافذة جديدة) WhatsApp
  • المشاركة على Telegram (فتح في نافذة جديدة) Telegram
  • المزيد
  • تدوينة
  • Tweet

مرتبط

RelatedPosts

68% of Passwords Can Be Cracked Within One Day, Kaspersky Warns

Heirs Energies Boosts Nigeria Oil Operations with Starlink Connectivity

Vault Strengthens Presence in Saudi Wealth Management Market

Tags: Cybercriminals attackKasperskyTrojan

Related Posts

passwords
English

68% of Passwords Can Be Cracked Within One Day, Kaspersky Warns

مايو 7, 2026
Heirs Energies
English

Heirs Energies Boosts Nigeria Oil Operations with Starlink Connectivity

مايو 6, 2026
سامي عبد الهادي، الشريك المؤسس والرئيس التنفيذي للعمليات في ڤولت Vault
English

Vault Strengthens Presence in Saudi Wealth Management Market

مايو 6, 2026
Global Optical Summit 2026
English

Huawei Unveils F5G-A Solutions at Optical Summit 2026

مايو 6, 2026
Load More

آخر الأخبار

فيروس هانتا

كل ما تريد معرفته عن فيروس هانتا وأعراضه وطرق انتقاله

مايو 9, 2026
PlayStation

Sony تدخل عصر الذكاء الاصطناعي رسميًا داخل ألعاب PlayStation

مايو 9, 2026
Apple

بعد سنوات من الانفصال.. اتفاق جديد بين Apple وIntel يشعل السوق

مايو 9, 2026
Google chrome

5 أدوات من Google لحماية حساباتك وتسهيل تسجيل الدخول بدون كلمات مرور

مايو 8, 2026
إي آند مصر

أسعار باقات الإنترنت الجديدة من اتصالات إي آند مصر بعد زيادة الأسعار 2026

مايو 8, 2026
No Result
View All Result
contact us: info@techno-fin.com Dubai:0553028804 Cairo:01150009990

Follow Us

All rights reserved to www.techno-fin.com, UAE, Sheikh Zayed Road, City Tower 2, 18th floor, office 1801
No Result
View All Result
  • آخر الأخبار
  • أمن إلكتروني
  • خدمات مالية
  • تقنيات ومنصات
  • ريادة أعمال
  • عالم الألعاب
  • مدن المستقبل
  • أحدث المنتجات
  • ترند
  • English

Go to mobile version