Close Menu
Crypto Chain Post
    Trending

    3 Token Unlocks to Watch In the Last Week of June 2025

    June 25, 2025

    Ethereum Titans Stake $100 Million Amid US-Iran Hostilities

    June 25, 2025

    Polkadot Drops to $3.18, Testing Critical $3.14 Support—Will DOT Hold?

    June 25, 2025

    Majority Whip Tom Emmer says House will vote on GENIUS stablecoin bill if paired with CLARITY Act

    June 25, 2025

    Shiba Inu Price Stalled By $400 Million Supply Zone, What’s Next?

    June 25, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Wednesday, June 25
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Saving Your Wallet Details, Seed Phrase as a Photo on Your Phone? This Trojan May Be Targeting You
    Analysis

    Saving Your Wallet Details, Seed Phrase as a Photo on Your Phone? This Trojan May Be Targeting You

    News RoomBy News RoomJune 24, 2025No Comments3 Mins Read

    A new strain of mobile spyware, dubbed SparkKitty, has infiltrated Apple’s App Store and Google Play, posing as crypto-themed and modded apps to stealthily extract images of seed phrases and wallet credentials.

    The malware appears to be a successor to SparkCat, a campaign first uncovered in early 2025, which used fake support chat modules to silently access user galleries and exfiltrate sensitive screenshots.

    SparkKitty takes the same strategy several steps further, Kaspersky researchers said in a Monday post.

    Unlike SparkCat, which mostly spreads through unofficial Android packages, SparkKitty has been confirmed inside multiple iOS and Android apps available through official stores, including a messaging app with crypto exchange features (with over 10,000 installs on Google Play) and an iOS app called “币coin,” disguised as a portfolio tracker.

    At the core of the iOS variant is a weaponized version of the AFNetworking or Alamofire framework, where attackers embedded a custom class that auto-runs on app launch using Objective-C’s +load selector.

    On startup, it checks a hidden configuration value, fetches a command-and-control (C2) address, and scans the user’s gallery and begins uploading images. A C2 address instructs the malware on what to do, such as when to steal data or send files, and receives the stolen information back.

    The Android variant utilizes modified Java libraries to achieve the same goal. OCR is applied via Google ML Kit to parse images. If a seed phrase or private key is detected, the file is flagged and sent to the attacker’s servers.

    Installation on iOS is done through enterprise provisioning profiles, or a method meant for internal enterprise apps but often exploited for malware.

    Victims are tricked into manually trusting a developer certificate linked to “SINOPEC SABIC Tianjin Petrochemical Co. Ltd.,” giving SparkKitty system-level permissions.

    Several C2 addresses used AES-256 encrypted configuration files hosted on obfuscated servers.

    Once decrypted, they point to payload fetchers and endpoints, such as/api/putImages and /api/getImageStatus, where the app determines whether to upload or delay photo transmissions.

    Kaspersky researchers discovered other versions of the malware utilizing a spoofed OpenSSL library (libcrypto.dylib) with obfuscated initialization logic, indicating an evolving toolset and multiple distribution vectors.

    While most apps appear to be targeted at users in China and Southeast Asia, nothing about the malware limits its regional scope.

    Apple and Google have taken down the apps in question following disclosure, but the campaign has likely been active since early 2024 and may still be ongoing through side loaded variants and clone stores, researchers warned.

    Read more: North Korean Hackers Are Targeting Top Crypto Firms With Malware Hidden in Job Applications

    Read the full article here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related News

    Polkadot Drops to $3.18, Testing Critical $3.14 Support—Will DOT Hold?

    June 25, 2025

    $359M Gone As Bitcoin, Ethereum Rebound

    June 25, 2025

    A New Malware on iPhone and Android Can Quietly Steal Your Crypto

    June 25, 2025

    Chainlink (LINK) Price Jumps 11% as Holders Crush All-Time High

    June 24, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Ethereum Titans Stake $100 Million Amid US-Iran Hostilities

    June 25, 2025

    Polkadot Drops to $3.18, Testing Critical $3.14 Support—Will DOT Hold?

    June 25, 2025

    Majority Whip Tom Emmer says House will vote on GENIUS stablecoin bill if paired with CLARITY Act

    June 25, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.