Accordingly, the malware, dubbed "SparkCat", includes OCR capabilities to find out sensitive information that iPhone users have screenshotted.
According to a report from Kaspersky, the software is intended to locate recovery phrases for electronic wallets, allowing attacks to steal bitcoins and other cryptocurrencies.
According to Kaspersky, SparkCat has been active since March 2024. Similar malware was discovered in 2023 targeting Android devices and PCs, but has now appeared on iOS.
At the same time, several App Store apps were identified with OCR spyware, including ComeCome, WeTink, and AnyGPT, but it is unclear whether the infection was intentional by the developers or the result of a supply chain attack.
The infected apps would request access to the user’s photos after downloading. If granted, they would use OCR to sort the images to find relevant text. Some of the apps are still in the App Store and appear to be targeting iOS users in Europe and Asia.
Android apps are also affected by this malware, so Kaspersky advises users to avoid storing screenshots containing sensitive information to avoid this type of attack.
Source: https://kinhtedothi.vn/xuat-hien-ma-doc-tan-cong-ios.html
Comment (0)