Hacker News: iPhone apps found on App Store with malware that reads your screenshots for data

Source URL: https://9to5mac.com/2025/02/05/iphone-apps-on-app-store-malware-reads-screenshots/
Source: Hacker News
Title: iPhone apps found on App Store with malware that reads your screenshots for data

Feedly Summary: Comments

AI Summary and Description: Yes

Summary: Researchers at Kaspersky have discovered a novel malware, termed ‘SparkCat’, embedded in iOS and Android apps, utilizing screenshot-reading OCR technology to search for sensitive recovery phrases related to cryptocurrency wallets. This marks a significant security concern as it represents the first known case of such malware infiltrating the Apple App Store.

Detailed Description: The findings reveal critical insights into the evolving landscape of mobile app security, particularly concerning the integrity of app marketplaces like Apple’s App Store:

– **Malware Mechanism**:
– The malicious app employs Optical Character Recognition (OCR) technology through Google’s ML Kit to scan users’ photo libraries.
– The malware identifies recovery phrases associated with cryptocurrency wallets, which can compromise users’ financial security.

– **Cross-Platform Impact**:
– The identified malware affected both iOS and Android platforms, indicating a broader threat across mobile operating systems.
– The malicious module designed for Android decrypts and activates the OCR functionality, similarly to the iOS variant.

– **Detection and Concerns**:
– The presence of the malware raises significant concerns about the security vetting processes of app marketplaces.
– It is unclear whether the malware resulted from a supply chain attack or malicious intent from app developers, emphasizing the need for stringent supply chain security measures.

– **Target Demographic**:
– The affected applications primarily targeted users in Asia and Europe, which underscores regional vulnerabilities that might be exploited by cybercriminals.

– **Legitimate vs. Malicious Apps**:
– Some apps were reportedly unaware of the presence of the malicious code, while others were designed with malicious intent to lure victims.
– Affected applications included legitimate services like food delivery apps.

– **Existing Threats**:
– Several infected apps remain available on the App Store, posing ongoing risks to users who may download them without awareness of the embedded malware.

This incident highlights the necessity for security professionals to regularly audit mobile applications, implement stronger verification procedures for app vetting, and educate users about potential security threats in the digital marketplace. As mobile app security risks evolve, adopting a proactive defense strategy and ensuring compliance with security best practices become imperative.