Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Privacy

First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases (securelist.com) 15

Kaspersky researchers have discovered malware hiding in both Google Play and Apple's App Store that uses optical character recognition to steal cryptocurrency wallet recovery phrases from users' photo galleries. Dubbed "SparkCat" by security firm ESET, the malware was embedded in several messaging and food delivery apps, with the infected Google Play apps accumulating over 242,000 downloads combined.

This marks the first known instance of such OCR-based spyware making it into Apple's App Store. The malware, active since March 2024, masquerades as an analytics SDK called "Spark" and leverages Google's ML Kit library to scan users' photos for wallet recovery phrases in multiple languages. It requests gallery access under the guise of allowing users to attach images to support chat messages. When granted access, it searches for specific keywords related to crypto wallets and uploads matching images to attacker-controlled servers.

The researchers found both Android and iOS variants using similar techniques, with the iOS version being particularly notable as it circumvented Apple's typically stringent app review process. The malware's creators appear to be Chinese-speaking actors based on code comments and server error messages, though definitive attribution remains unclear.

First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases

Comments Filter:
  • wtf (Score:3, Insightful)

    by Anonymous Coward on Wednesday February 05, 2025 @03:46PM (#65144879)
    recovery phrases in photo galleries? ummm WTF. People are stupid.
  • by NotEmmanuelGoldstein ( 6423622 ) on Wednesday February 05, 2025 @05:19PM (#65145221)

    ... users' photo galleries.

    This is no different to having the pass-phrase in a text file: Anyone can read it. Worse, Microsoft and Google make a point of copying on-device photos (for your safety, pinky-swear). Microsoft has even been caught installing Recall spyware that makes photos, copies them, then translates them to literal text as a quote or description. With that sort of security hole in modern computers, it's obvious that anything not encrypted is easily stolen. (I side-step the issue that Recall can watch you encrypting stuff, making the activity, insecure.)

    Everyone knows by now, don't attach the password to the device display, don't put it under your keyboard or on your credit card. It demonstrates extreme laziness, to think that a photo is, somehow, more secure. This is simply people refusing to use the software that actually solves this problem: A password manager. Most of them can also encrypt a photo.

  • Seems Kaspersky is always discovering this stuff but USA can't use Kaspersky because it might be ...gulp.... spyware! Maybe someone can point out to Trump that Biden banned it, so he then unbans it.
  • This does not make sense. iOS, for a few years now, has blocked 3rd-party apps to your photo library by default. What's more, when you use a 3rd-party app that wants to read your photos, you authorize each photo you want to share, edit, or whatever you want to do with it, individually.

    I'm going to guess and hope that no one is enough of a goofus to share the photo of their crypto wallet passphrase with some random app. So how does this malware break through the OS's protections and get to the rest of the

The algorithm for finding the longest path in a graph is NP-complete. For you systems people, that means it's *real slow*. -- Bart Miller

Working...