Crypto News

Researchers taught malicious programs to steal Google and Apple applications

The researchers at Kaspersky detailed a campaign of harmful programs over length, which aims to recover the cryptocurrency wallet through harmful mobile applications.

according to Modern reportThe “Sparkcat” campaign uses the SDK software development group included in modified messaging applications and other applications to wipe user photo galleries to obtain sensitive recovery data. This technique was first noted in March 2023.

At that time, cybersecurity researchers noticed the features of harmful programs within the messaging applications that scan exhibitions users for the phrases to recover the encryption portfolio – known as Mnemonics – to send them to remote servers.

The researchers said that the initial campaign only affected Android and Windows users through informal application sources.

This is not true for Sparkcat, which was discovered in late 2024. This new campaign uses a built -in SDK framework in many applications available on official and informal application markets for Android and iOS devices.

In one case, the dining delivery app called “Comecome” was found on Google Play to include harmful SDK. The affected apps have been installed collectively more than 242,000 times, and similar malware has been determined later in the applications available in the Apple App Store.

I told Crypto Cybersecurity Hackeen, Decipher The preventive measures used by application stores are usually up to the machine checks and rarely include manual reviews.

Slava Demcock, CEO of Bluchin Analysis Company, also highlighted that the problem is exacerbated by disturbing the software instructions and harmful updates that provide harmful programs after approveing ​​the application already.

He told the “Sparkcat case”, the attackers have disturbed the entry point to hide their actions from security and law enforcement researchers. Decipher. “This tactic helps them to evade the disclosure while keeping their methods secret of competitors.”

Google’s ML ML CCT When users reach the support chat feature, SDK requests their order with a permission to read the photo gallery.

If permission is granted, the app wipes images for the main words that indicate a memory in multiple languages. Then the matching images are encrypted and transferred to a remote server.

Dimchok noted that “this attack is somewhat unusual – I have often seen similar tactics of fraud on ATMs, where the attackers steal the pin symbols.”

He added that withdrawing such an attack requires a good level of artistic ingenuity, and if the process becomes more simple to repeat, this may cause more damage.

He said: “If the experienced fraudsters start selling ready -made text programs, this method may spread quickly.”

Ajayi agreed, noting that “OCR for scanning is a smart trick,” but he believes that there is still space for improvement. “Imagine a mixture of optical knowledge and AI to choose automatically sensitive information from photos or screens.”

As a advice for users, Demchuk recommended thinking twice before granting permissions to applications. Ajayi also suggests that the wallet developers “must find better ways to deal with sensitive data and display them like seeds phrases.”

Edit Stacy Elliot.

Extract daily information Newsletter

Start every day with the best news stories now, as well as original features, podcasts, videos and more.

https://cdn.decrypt.co/resize/1024/height/512/wp-content/uploads/2020/06/glupteba-malware-bitcoin-blockchain-gID_7.jpg

2025-02-05 22:29:00

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button