By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Daily HacklyDaily HacklyDaily Hackly
  • Tech & Digital Trends
  • Entertainment & Lifestyle
  • Money & Smart Living
  • Productivity & Life Hacks
Search
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Malware Disguised as Photo-Scanning Software Discovered on Apple’s App Store for the First Time
Share
Sign In
Notification Show More
Font ResizerAa
Daily HacklyDaily Hackly
Font ResizerAa
Search
  • Home
    • Home 4
  • Categories
  • Bookmarks
  • More Foxiz
    • Sitemap
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Daily Hackly > Blog > Tech & Digital Trends > Malware Disguised as Photo-Scanning Software Discovered on Apple’s App Store for the First Time
Tech & Digital Trends

Malware Disguised as Photo-Scanning Software Discovered on Apple’s App Store for the First Time

DailyHackly
Last updated: February 26, 2025 4:50 pm
DailyHackly
Share
Malware Disguised as Photo-Scanning Software Discovered on Apple’s App Store for the First Time
SHARE

Guarding Against Malware in Apps: What You Need to Know

While many applications can enhance device functionality, not all come with guaranteed safety. It is advisable to acquire applications solely from reputable sources, such as the iOS App Store and Google Play Store. These platforms have stringent protocols in place to detect and eliminate malware before it reaches consumers. However, both Apple and Google are not infallible; malicious apps can, and do, find their way onto these official marketplaces more frequently than one might expect. This issue is particularly prevalent within the Play Store due to Apple’s more rigorous guidelines, but it’s important to remember that the App Store is not immune—instances of malware infiltration have been documented, as previously reported. Recently, researchers uncovered a collection of apps containing harmful software on both platforms, marking a notable discovery of this malware type within the iOS ecosystem.

Understanding SparkCat

A team of researchers from Kaspersky recently identified applications on both Apple’s App Store and Google’s Play Store that were laced with malicious code wielding the capability to purloin cryptocurrency wallet recovery phrases—critical lists of words required to access digital wallets. Dubbed “SparkCat,” this malware variant is believed to have emerged as early as March 2024.

If users installed these infected apps on iOS or Android systems, they were often prompted to grant access to their photo libraries. Following this, the malware would initiate an optical character recognition (OCR) plug-in, scanning through the images stored on the device. Should it detect text matching specific keywords, it would transmit those screenshots to a remote server. The goal is to hunt for images containing sensitive recovery phrases that could allow hackers unauthorized access to crypto accounts.

The first app that piqued Kaspersky’s interest was a Chinese food delivery service known as ComeCome. When this report was published on February 5, it remained available on both iOS and Android. This was identified as the first instance of an app with OCR malware appearing on the App Store. Since then, both platforms have delisted it. Notably, a damaging review dating back to 2023 hinted at the app’s alleged malware activity, although it remains unclear whether this specific OCR methodology was always part of its operation.

Next Steps to Take

For anyone who has these dubious applications installed on their phones, it is crucial to delete them immediately. Even if the developers did not intentionally incorporate malicious code—potentially due to a third-party compromise—retaining such apps can be risky. Furthermore, the removal of these apps from the store does not guarantee their deletion from your device, so proactive action is necessary.

Following the uninstallation, it would be wise to thoroughly examine the images saved on your device. Should there be any pictures containing recovery phrases for your cryptocurrency wallets, delete them. Additionally, consider eliminating any images that contain sensitive personal information, as different strains of malware may exploit OCR technology to unearth social security numbers or banking details. It’s best to minimize such risks entirely.

Lastly, maintain vigilance when downloading new applications, even from trusted app stores. Scrutinize all components of the app page—including reviews, descriptions, and previews—before proceeding with an installation. If any aspect seems dubious, it’s advisable to proceed with caution and refrain from downloading. Special care should also be taken with generic AI applications, as the rising demand for AI solutions has led to malicious users embedding malware in these apps, hoping to attract unsuspecting AI enthusiasts. Stay vigilant and don’t fall prey to such tactics.

This article was initially published on February 5, 2025, and was revised on February 7 to indicate that both Apple and Google have subsequently removed the highlighted malicious apps from their app stores.

You Might Also Like

A Complete Guide to Erasing Your X Account

Reasons Behind Microsoft’s Decision to Eliminate Passwords for New Accounts

Transfer Your Apple Purchases Between Accounts at Last

Top Free VPN Applications You Can Use Right Now

Uncovering the Overlooked FAQs of Windows 11 That May Reveal the Reasons Behind Your PC’s Sluggish Performance

TAGGED:Apple App Storeapplication malveillantecybersécuritédécouvertes de malwarelogiciel dangereuxlogiciel de numérisation de photosmalwaremenaces numériquesprotection contre les malwaresprotection des donnéessécurité des applicationssécurité des smartphonessécurité informatiquevirus

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article The Significance of Credit History Over Credit Score The Significance of Credit History Over Credit Score
Next Article Misconceptions of the Week: Understanding Pluto’s Continued Status as a Planet (In a Certain Context) Misconceptions of the Week: Understanding Pluto’s Continued Status as a Planet (In a Certain Context)
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1kLike
69.1kFollow
134kPin
54.3kFollow
banner banner
Create an Amazing Newspaper
Discover thousands of options, easy to customize layouts, one-click to import demo and much more.
Learn More

Latest News

Top Memorial Day Discounts on Affordable Headphones and Earbuds
Top Memorial Day Discounts on Affordable Headphones and Earbuds
Tech & Digital Trends
Google Introduces Premium AI Subscription Plan with a Hefty Price Tag
Google Introduces Premium AI Subscription Plan with a Hefty Price Tag
Tech & Digital Trends
Currently Available: Compact, Waterproof Sony Speaker Priced at Only $35
Currently Available: Compact, Waterproof Sony Speaker Priced at Only $35
Tech & Digital Trends
Google Unveils Agent Mode for Gemini, Transforming Its AI into an Authentic Personal Assistant
Google Unveils Agent Mode for Gemini, Transforming Its AI into an Authentic Personal Assistant
Tech & Digital Trends
//

We influence 20 million users and is the number one business and technology news network on the planet

Quick Link

  • Contact
  • Blog
  • Complaint
  • Advertise

Support

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

Daily HacklyDaily Hackly
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?