24 June 2025
2 0
New Mobile Spyware SparkKitty Targets Users’ Crypto Wallet Credentials
A new mobile spyware strain, SparkKitty, has been discovered on Apple’s App Store and Google Play, disguised as crypto-themed and modified apps. It targets users to extract seed phrases and wallet credentials.
Key details include:
- Successor to SparkCat, which used fake support chats to access user images.
- Confirmed in multiple official apps, including a messaging app with crypto features and an iOS portfolio tracker named “币coin.”
- iOS version employs a modified AFNetworking or Alamofire framework to exfiltrate data upon app launch.
- Android variant uses altered Java libraries and Google ML Kit for image processing to identify sensitive information.
- Victims must trust a developer certificate linked to “SINOPEC SABIC Tianjin Petrochemical Co. Ltd.” for system-level permissions.
- Command-and-control (C2) addresses utilize AES-256 encrypted configuration files for instructions on data theft.
- Targets primarily focus on users in China and Southeast Asia but are not regionally restricted.
- Apple and Google removed the affected apps after the discovery; however, the campaign may continue through side-loaded variants.
Kaspersky researchers noted an evolution in the malware's toolset and continuous distribution methods. The threat remains active since early 2024.