Accordingly, the malware, called "SparkCat," includes OCR capabilities to find sensitive information that iPhone users have captured in screenshots.
According to a report from Kaspersky, the software aims to locate recovery phrases for digital wallets, enabling attacks to steal bitcoin and other cryptocurrencies.

According to Kaspersky, SparkCat has been active since March 2024. Similar malware was detected in 2023 targeting Android devices and PCs, but has now appeared on iOS.
Simultaneously, several App Store applications were identified as containing OCR spyware, including ComeCome, WeTink, and AnyGPT, but it is unclear whether the infection was a deliberate act by the developers or the result of a supply chain attack.
Malicious apps will request access to users' photos after downloading them. If granted, they will use OCR functionality to sort the images to find relevant text. Some of these apps are still in the App Store and appear to be targeting iOS users in Europe and Asia.
Android applications are also affected by this malware, so Kaspersky advises users to avoid storing screenshots containing sensitive information to prevent this type of attack.
Source: https://kinhtedothi.vn/xuat-appear-ma-doc-tan-cong-ios.html






Comment (0)