Malicious iPhone apps are spreading screenshot-reading malware on the Apple App Store — how to stay safe

Malicious iPhone apps are spreading screenshot-reading malware on the Apple App Store — how to stay safe

For the first time, the Apple App Store is sharing malware privileges with the Google Play Store as apps infected with screenshot-reading SparkCat malware have been discovered on both platforms by cybersecurity software firm Kaspersky.

The goal of SparkCat is to steal cryptocurrency using multiple apps to hide malicious screenshot reading code with OCR, optical character recognition. OCR converts an image of text into machine readable formats; the malware triggers requests to access photo galleries when users try to use chat support features within the infected apps. The apps then use OCT tech to search the device for screenshots of crypto wallet passwords or recovery phrases. The images are sent back to attackers who then use the stolen information to access wallets and steal cryptocurrency.

Source link

Visited 1 times, 1 visit(s) today

Leave a Reply

Your email address will not be published. Required fields are marked *