• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

Kaspersky Unveils a New Trojan Spy on App Store and Google Play

Simon Osuji by Simon Osuji
June 24, 2025
in Technology
0
Kaspersky Unveils a New Trojan Spy on App Store and Google Play
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

Kaspersky researchers have discovered a new Trojan spy called SparkKitty, which targets smartphones on iOS and Android.

It sends images from an infected phone and information about the device to the attackers. This malware was embedded in apps related to crypto and gambling, as well as in a trojanized TikTok app, and was distributed on the App Store and Google Play, as well as on scam websites.

Related posts

Anambra regains oil wells from Delta, eyes increased derivation revenue – EnviroNews

Anambra regains oil wells from Delta, eyes increased derivation revenue – EnviroNews

March 5, 2026
Lilly to acquire Verve in $1B bet on gene editing for heart disease

Lilly targets employers in new bid to broaden access to obesity drugs

March 5, 2026

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in South Africa are also potentially at risk of facing a similar cyber threat. Certain technical details suggest that the new malware campaign is linked to the previously discovered SparkCat Trojan—malware (the first of its kind on iOS) with a built-in optical character recognition (OCR) module that allows it to scan image galleries and steal screenshots containing cryptocurrency wallet recovery phrases or passwords. 

iOS

On the App Store, the Trojan pretended to be an app related to cryptocurrencies — 币coin. On phishing pages mimicking the official iPhone App Store, the malware was distributed under the guise of TikTok and gambling applications.

 

An alleged crypto exchange app, 币coin, on the App Store.

 

A fake web store embedded into the alleged TikTok app.

“One of the vectors for the Trojan’s distribution turned out to be fake websites where the attackers tried to infect the victims’ iPhones. iOS has several legitimate ways to install programs not from the App Store, explains Sergey Puzan, a malware expert at Kaspersky.

”In this malicious campaign, the attackers used one of them—special developer tools for distributing corporate business applications. In the infected version of TikTok, during authorization, the malware, in addition to stealing photos from the smartphone gallery, embedded links to a suspicious store in the person’s profile window. This store only accepts cryptocurrencies, which increases our concerns about it.”

Android

The attackers targeted users both on third-party websites and on Google Play, passing off the malware as various crypto services. For example, one of the infected applications—a messenger called SOEX with a cryptocurrency exchange function—was downloaded from the official store over 10,000 times.

An alleged crypto exchange app, SOEX, on Google Play.

Experts also found APK files of infected apps (these can be installed directly on Android smartphones, bypassing official stores) on third-party websites that are likely related to the detected malicious campaign. They are positioned as investment crypto projects. The websites on which these applications were posted were advertised on social networks, including YouTube.

“After the apps were installed, they functioned as promised in their description. But at the same time, photos from the smartphone gallery were sent to the attackers. The attackers may later try to find various confidential data in the images, for instance, crypto wallet recovery phrases to access the victims’ assets.

There are indirect signs that the attackers are interested in people’s digital assets: many of the infected apps were related to crypto, and the Trojanized TikTok app also had a built-in store that accepted payment for goods only in crypto,” comments Dmitry Kalinin, a malware expert at Kaspersky. 

Source link

Previous Post

Top 10 countries at war with the strongest militaries in 2025, as people discuss World War 3

Next Post

Trump Says Iran-Israel Ceasefire in Force

Next Post
Trump Says Iran-Israel Ceasefire in Force

Trump Says Iran-Israel Ceasefire in Force

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Invisible Warrior Makes Positive Impact In Drought Battle

Invisible Warrior Makes Positive Impact In Drought Battle

5 months ago
As Colorado closes its coal plants, some schools neglect to prepare

As Colorado closes its coal plants, some schools neglect to prepare

12 months ago
MTN warns of 90% profit plunge

MTN warns of 90% profit plunge

2 years ago
L3Harris Achieves First Flight With Modernized USAF C-130H Aircraft

L3Harris Achieves First Flight With Modernized USAF C-130H Aircraft

2 years ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • Mahama attends Liberia’s 178th independence anniversary

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.