Apple Missed Screenshot-snooping Malware In Code That Made It Into The App Store, Kaspersky Claims

Kaspersky eggheads say they’ve spotted the first app containing hidden optical character recognition spyware in Apple’s App Store. Cunningly, the software nasty is designed to steal cryptocurrency.
The researchers found the malware in an iOS app called ComeCome, which is also available from Google’s Play store, and claims to offer food delivery services. According to Kaspersky's Dmitry Kalinin and Sergey Puzan, the application also delivers the keys to victims’ crypto holdings to crooks.
The app can do that as, according to Kaspersky’s analysts this week, it is “embedded with a malicious SDK/framework” that at an unspecified moment decrypts an optical character recognition (OCR) plugin. Once that OCR code is running, the app hunts for screenshots on mobile devices in the hope that some include cryptocurrency wallet recovery phrases, aka seed phrases, that the OCR will extract and the spyware will exfiltrate.
With those stolen seed phrases in hand, the app's masterminds can take control of victims' wallets, and transfer funds out of them. That's why your seed phrase needs to be kept a secret, offline and not as an image on your phone.
"Our investigation revealed that the attackers were targeting crypto wallet recovery phrases, which were sufficient for gaining full control over a victim's crypto wallet to steal the funds," Team Kaspersky wrote.
“Unfortunately, despite rigorous screening by the official marketplaces and general awareness of OCR-based crypto wallet theft scams, the infected apps still found their way into Google Play and the App Store,” the duo added, before noting the apps may have evaded checks because they offer “no indication of a malicious implant hidden within the app” and may appear harmless.
“This case once again shatters the myth that iOS is somehow impervious to threats posed by malicious apps,” they opined.
The duo dubbed the seed-snatching malware SparkCat, and noted it "is flexible enough to steal not just these phrases but also other sensitive data from the gallery, such as messages or passwords that might have been captured in screenshots."
The cryptocurrency-stealing effort targets "at a minimum" Android and iOS users in Europe and Asia, says Team Kaspersky. More than one app in the Google Play store contains SparkCat, we're told, and these were downloaded more than 242,000 times. Neither Google nor Apple responded to The Register's requests for comment.
The analysts cannot confirm whether SparkCat was slipped into these applications in a supply-chain attack or as a deliberate act by the apps' developers. Apple has removed the malicious ComeCome application from the iOS store, says Kaspersky. We note it's also disappeared from Google Play along with others named by the Russian lab.
- Microsoft pulls text recognition from Photos app preview
- Brazen crims selling stolen credit cards on Meta's Threads
- FireScam infostealer poses as Telegram Premium app to surveil Android devices
- Google to Iran: Yes, we see you using Gemini for phishing and scripting. We're onto you
SparkCat refers to a highly obfuscated module called Spark within the malicious apps. The spyware is mostly written in Java and uses an unidentified protocol implemented in Rust to communicate with its remote command-and-control (C2) server.
After connecting to its C2 server, the Android version of Spark downloads and uses a wrapper for the TextRecognizer interface in Google's ML Kit library to perform the character extraction from images. The malware loads different OCR models depending on the system language that recognizes Latin, Korean, Chinese, or Japanese characters in pictures.
If a mark engages with a poisoned app's support team – interactions made possible with the legitimate third-party Easemob HelpDesk SDK – the software requests access to the device's photo gallery. If access is granted, it scans screenshots using OCR to extract crypto wallet recovery phrases and sends them to the C2 server.
The app’s developers are therefore hoping users do two things: Grant access to the gallery after taking screenshots of recovery phrases. Sadly, it appears there are enough users who will make those mistakes to make the effort of creating these apps worthwhile. ®
From Chip War To Cloud War: The Next Frontier In Global Tech Competition
The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more
The High Stakes Of Tech Regulation: Security Risks And Market Dynamics
The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more
The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics
Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more
The Data Crunch In AI: Strategies For Sustainability
Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more
Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser
After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more
LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue
In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more