By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Times CatalogTimes CatalogTimes Catalog
  • Home
  • Tech
    • Google
    • Microsoft
    • YouTube
    • Twitter
  • News
  • How To
  • Bookmarks
Search
Technology
  • Meta
Others
  • Apple
  • WhatsApp
  • Elon Musk
  • Threads
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Reading: iOS App Store apps with screenshot-reading malware found for the first time
Share
Notification
Font ResizerAa
Font ResizerAa
Times CatalogTimes Catalog
Search
  • News
  • How To
  • Tech
    • AI
    • Apple
    • Microsoft
    • Google
    • ChatGPT
    • Gemini
    • YouTube
    • Twitter
  • Coming Soon
Follow US
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Times Catalog > Blog > Apple > iOS App Store apps with screenshot-reading malware found for the first time
AppleNewsSecurityTech

iOS App Store apps with screenshot-reading malware found for the first time

Usama
Last updated: February 6, 2025 5:21 pm
Usama
Share
5 Min Read
iOS App Store apps with screenshot-reading malware found for the first time
SHARE

Kaspersky discovered ‘SparkCat’ malware aimed at stealing cryptocurrency in multiple iOS apps.

In a significant cybersecurity development, malicious apps capable of reading screenshots have been discovered in both Apple’s App Store and Google Play Store. This marks the first known instance of such sophisticated malware successfully infiltrating Apple’s tightly regulated ecosystem, according to a report published today by cybersecurity firm Kaspersky.

Contents
A New Breed of Malware: “SparkCat”How the Malware WorksTargeted Apps IdentifiedSupply Chain Attack or Developer Malfeasance?The Risks and What You Can DoApple and Google’s ResponseA Wake-Up Call for Mobile Security

A New Breed of Malware: “SparkCat”

Kaspersky’s cybersecurity researchers uncovered the alarming presence of a malware campaign, dubbed “SparkCat,” in late 2024. Their analysis suggests that the underlying malicious frameworks were developed as early as March 2024. Unlike traditional malware that exploits device vulnerabilities or steals login credentials through phishing tactics, SparkCat employs Optical Character Recognition (OCR) technology to scan images for sensitive data.

How the Malware Works

On both iOS and Android, the infected apps deploy a deceptive method to gain access to users’ photo galleries. The malware is activated when users attempt to interact with in-app chat support, triggering a seemingly routine request to access their photo library. If permission is granted, the malware uses Google’s OCR technology to extract text from screenshots stored on the device. This method is particularly dangerous for cryptocurrency users, as many take screenshots of their wallet credentials, including private keys and recovery phrases. Once the malware identifies relevant screenshots, it sends them to cybercriminals who can then use the stolen data to access and drain crypto wallets.

Targeted Apps Identified

Kaspersky’s investigation identified three specific apps infected with the SparkCat malware that are still available for download:

  • WeTink – An AI-powered chat application
  • AnyGPT – Another AI chatbot app
  • ComeCome – A food delivery service app

While the first two appear to be designed specifically as part of the malware campaign, ComeCome masquerades as a legitimate food delivery service, adding another layer of deception to the attack. The continued availability of these apps in official app stores underscores the evolving challenges of app store security and the sophisticated techniques cybercriminals now employ.

Supply Chain Attack or Developer Malfeasance?

At this stage, Kaspersky has not determined whether the inclusion of the malicious code resulted from a supply chain attack—where third-party software components were compromised—or if the developers intentionally embedded the malware. The latter scenario would imply a direct and deliberate attempt to distribute the malware, raising serious concerns about vetting processes within app marketplaces.

The Risks and What You Can Do

This discovery highlights the increasing risks associated with granting apps access to personal data, particularly sensitive information stored in photo galleries. While both Apple and Google enforce strict app review policies, this incident reveals vulnerabilities even within their walled ecosystems.

To protect yourself from such threats, consider the following precautions:

  1. Be cautious when granting app permissions – Avoid giving apps access to your photos unless absolutely necessary.
  2. Use secure password managers – Store sensitive credentials in encrypted password managers instead of taking screenshots.
  3. Regularly audit installed apps – Uninstall applications that request suspicious or unnecessary permissions.
  4. Enable two-factor authentication (2FA) – Secure crypto wallets and other sensitive accounts with additional security layers.
  5. Keep your software updated – Ensure your device’s operating system and security patches are up to date to mitigate vulnerabilities.

Apple and Google’s Response

Neither Apple nor Google have yet responded to inquiries regarding the presence of these malicious apps in their stores. Given the seriousness of this breach, it is expected that both companies will take swift action to remove the compromised apps and reinforce their security measures.

A Wake-Up Call for Mobile Security

The emergence of SparkCat serves as a stark reminder that no app ecosystem, not even Apple’s renowned App Store, is completely immune to cyber threats. As mobile security risks evolve, users must remain vigilant, adopt best security practices, and treat app permissions with caution.

Cybercriminals are constantly innovating new methods to steal sensitive information, and this incident demonstrates that even well-guarded platforms can be infiltrated. Whether through deceptive app permissions or sophisticated OCR-based attacks, the digital landscape continues to be a battleground for data security.

Kaspersky urges all users who have downloaded WeTink, AnyGPT, or ComeCome to remove these apps immediately and check their accounts for any suspicious activity. Stay informed, stay secure, and always think twice before granting apps access to your personal data.

You Might Also Like

Logitech’s MX Creative Console now supports Figma and Adobe Lightroom

Samsung resumes its troubled One UI 7 rollout

Google Messages starts rolling out sensitive content warnings for nude images

Vivo wants its new smartphone to replace your camera

Uber users can now earn miles with Delta Air Lines

Share This Article
Facebook Twitter Pinterest Whatsapp Whatsapp Copy Link
What do you think?
Love0
Happy0
Sad0
Sleepy0
Angry0
Previous Article ChatGPT Search no longer requires an OpenAI account to use ChatGPT Search no longer requires an OpenAI account to use
Next Article These researchers used NPR Sunday Puzzle questions to benchmark AI ‘reasoning’ models These researchers used NPR Sunday Puzzle questions to benchmark AI ‘reasoning’ models
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

144FollowersLike
23FollowersFollow
237FollowersPin
19FollowersFollow

Latest News

Pinterest is prompting teens to close the app at school
Pinterest is prompting teens to close the app at school
News Tech April 22, 2025
ChatGPT search is growing quickly in Europe, OpenAI data suggests
ChatGPT search is growing quickly in Europe, OpenAI data suggests
AI ChatGPT OpenAI April 22, 2025
social-media-is-not-wholly-terrible-for-teen-mental-health-study-says
Social media is not wholly terrible for teen mental health, study says
News April 22, 2025
Google is trying to get college students hooked on AI with a free year of Gemini Advanced
Google is trying to get college students hooked on AI with a free year of Gemini Advanced
AI Gemini Google Tech April 19, 2025
Times CatalogTimes Catalog
Follow US
© 2025 Times Catalog
  • About
  • Contact
  • Privacy Policy and Disclaimer
Welcome Back!

Sign in to your account

Lost your password?