Security researchers at Kaspersky have identified a new, updated variant of the SparkCat mobile malware on both the official Apple App Store and Google Play Store. The malware was found embedded in applications masquerading as legitimate tools, such as enterprise chat and food delivery services, and appears to be primarily targeting users in Asia.
SparkCat employs a unique and insidious method for theft: it uses Optical Character Recognition (OCR) technology to scan the victim's entire photo library. Its goal is to find images, such as screenshots, that contain the 12 or 24-word recovery phrases for cryptocurrency wallets. Upon finding a match, the malware exfiltrates the image to a command-and-control (C2) server, granting the attackers full access to steal the victim's digital assets. The reappearance of this sophisticated malware on official app stores demonstrates the ongoing challenge of policing these ecosystems against determined, financially motivated threat actors.
SparkCat, first identified in 2025, represents a specialized threat to cryptocurrency users. Unlike traditional mobile banking trojans that use overlays to steal credentials, SparkCat targets the common but insecure practice of users taking screenshots of their wallet recovery phrases for backup. The threat actor, believed to be a Chinese-speaking group, has successfully bypassed the automated and manual review processes of both Apple and Google to get their malicious apps onto the stores.
The attack begins when a user downloads one of the trojanized applications and grants it permission to access their photo gallery—a seemingly innocuous request for many app types. Once access is granted, the malware begins its main routine in the background. It iterates through every image file in the user's library and applies an OCR model to extract any text. This text is then compared against patterns that match common cryptocurrency wallet recovery phrase formats. If a likely phrase is identified, the entire image file is uploaded to the attacker's C2 server.
The malware's operation is simple but effective:
T1475 - IO Hijacking (in the mobile context, tricking the user into granting permissions).T1452 - Data from Local System.T1452 - Data from Local System.T1041 - Exfiltration Over C2 Channel.The use of OCR to find secrets in images is a clever technique that bypasses security controls focused on file-based data or direct input theft. It exploits user behavior rather than a technical vulnerability in the OS.
The impact on victims is direct and often irreversible financial loss. Once a cryptocurrency transaction is made, it cannot be reversed. Victims can lose their entire crypto portfolio in a matter of minutes after their recovery phrase is compromised. The targeting of users in Asia suggests a regional focus, but the malware could easily be adapted for global campaigns. The presence of SparkCat on official app stores erodes user trust and demonstrates that even these curated environments are not immune to sophisticated threats, posing a risk to millions of mobile users who store sensitive information as images on their devices.
Detection on a non-jailbroken mobile device is very difficult for an end-user. Detection relies on network-level and vendor-side analysis.
| Type | Value | Description |
|---|---|---|
| Network Traffic Pattern | High volume of image uploads from a non-photo app | An application like a messenger or delivery service unexpectedly uploading numerous images to an unknown server is highly suspicious. |
| String Pattern | Known SparkCat C2 domains | Network security solutions can block connections to C2 domains identified by Kaspersky. (Specific domains not public). |
| Application Name | Specific app names identified by Kaspersky | The apps are typically removed quickly, but their bundle IDs can be used for historical detection. |
For Users:
For Enterprise (MDM):
Mitigation relies heavily on user awareness and secure practices for managing cryptocurrency.
Educating users to never store recovery phrases digitally and to be skeptical of app permissions is the primary defense.
The most effective countermeasure against SparkCat is not technical, but behavioral. Users must be educated and adhere to a strict policy of never storing cryptocurrency recovery phrases in any digital format. This includes not taking screenshots, not saving them in password managers, not emailing them to oneself, and not storing them in a text file. Recovery phrases should be written on a physical medium (paper or metal) and secured in a safe place, like a physical safe. This completely removes the data that SparkCat is designed to steal, rendering the malware ineffective even if it successfully infects a device. Security awareness campaigns should specifically highlight the risk of storing seed phrases in photos.
Mobile users must practice strict permission management for all applications. Before granting an app access to the photo library, users should critically assess whether the app truly needs that permission for its core function. For example, a food delivery app has no legitimate reason to require access to your entire photo library. On both iOS and Android, users can review and revoke permissions for already-installed apps in the system settings. Furthermore, when an app does require photo access, users should leverage newer OS features that allow granting access to only specific, selected photos rather than the entire library. This principle of least privilege for app permissions can significantly limit the scope of what malware like SparkCat can access.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats