Close Menu
Crypto Chain Post
    Trending

    SEI Token Surges Over 100% in June – Top Catalysts Explained

    June 25, 2025

    Fuzzland Reveals Ex-Employee Behind $2M Bedrock UniBTC Exploit

    June 25, 2025

    Coinbase Reveals Role in US Secret Service Seizure of $225 Million in Stolen Crypto

    June 25, 2025

    If companies, countries and ETFs are buying bitcoin — who’s selling?

    June 25, 2025

    Republic of Palau audits the country’s Stablecoin Pilot project on the XRP Ledger

    June 25, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Wednesday, June 25
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » How the ‘SparkKitty’ Trojan Is Stealing Crypto Wallet Data From Phones
    Analysis

    How the ‘SparkKitty’ Trojan Is Stealing Crypto Wallet Data From Phones

    News RoomBy News RoomJune 25, 2025No Comments2 Mins Read

    A newly discovered Trojan dubbed “SparkKitty” is infecting smartphones and siphoning off sensitive data, potentially enabling attackers to drain victims’ cryptocurrency wallets, cybersecurity firm Kaspersky said in a report on Tuesday.

    The malware is embedded in apps related to crypto trading, gambling, and even modified versions of TikTok.

    Once installed via deceptive provisioning profiles—used for running iOS apps or modified apps—SparkKitty requests access to the photo gallery. It monitors for changes, creates a local database of stolen images, and uploads photos to a remote server.

    “We suspect the attackers’ main goal is to find screenshots of crypto wallet seed phrases,” Kaspersky said.

    Currently, the malware primarily targets victims in China and Southeast Asia. However, the firm warned that there was nothing to stop it from spreading to other regions.

    In its 2024 report, TRM Labs estimated that nearly 70% of the $2.2 billion in stolen crypto last year resulted from infrastructure attacks, particularly those involving the theft of private keys and seed phrases. 

    Infected devices

    Malware like SparkKitty enables such thefts as attackers can use data from infected devices to search for wallet credentials. Seed phrases are highly valuable because they allow full access to a user’s crypto wallet.

    SparkKitty is believed to be linked to the SparkCat spyware campaign first uncovered in January 2025, which similarly used malicious SDKs to gain access to photos on user devices. 

    While SparkCat focused its spyware on images with seed phrases using Optical Character Recognition (OCR technology, SparkKitty indiscriminately uploads photos, presumably to be processed later.

    Its presence has been confirmed in both Android and iOS apps on their respective app stores, including disguised as crypto-themed tools and TikTok mods. 

    SparkKitty joins a host of other crypto-targeting malware and trojans that have gained popularity among hackers over the last few years.

    Among them, the information stealer Noodlophile has been found embedded in AI tools available for download online, taking advantage of current interest around the technology.

    Hackers build convincing-looking AI sites and then advertise them via social media to attract unsuspecting victims. 

    An international law enforcement effort in May targeted key infrastructure related to the distribution of another strain of malware, LummaC2, which has been linked to over 1.7 million theft attempts. 

    LummaC2 aimed to steal information related to login credentials, including for crypto wallets. 

    Edited by Sebastian Sinclair

    Read the full article here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related News

    Useless Coin price hits new all-time high amid whale buying

    June 25, 2025

    Sonic’s rebound lacks volume; bearish structure not yet broken

    June 25, 2025

    will a Double Bottom trigger a reversal?

    June 25, 2025

    a new turn in the Democrats battle v Trump’s cryptocurrency business?

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Fuzzland Reveals Ex-Employee Behind $2M Bedrock UniBTC Exploit

    June 25, 2025

    Coinbase Reveals Role in US Secret Service Seizure of $225 Million in Stolen Crypto

    June 25, 2025

    If companies, countries and ETFs are buying bitcoin — who’s selling?

    June 25, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.