A new version of the SparkCat malware is spreading through the Google Play Store and Apple's App Store This article explores version sparkcat malware. . The bad software is hidden in apps that look like they are useful, like business messaging apps and food delivery services.
It quietly looks through users' photo galleries for codes that will help them get their cryptocurrency back. The iOS version uses a different method by looking for English mnemonic phrases for cryptocurrency wallets. The Android version looks for Japanese, Korean, and Chinese keywords, which shows that it is aimed at the Asian market. According to Kaspersky, the most recent updates show that this malware is always changing and poses a serious threat.
The people who carry out these operations are also very skilled.
The cybersecurity company said in a blog post on Monday that this campaign shows how important it is to use security solutions on smartphones to protect against a wide range of cyber threats. The most recent version of SparkCat was first recorded in February 2025. It uses an optical character recognition (OCR) model to steal certain images with wallet recovery phrases from photo libraries and send them to a server controlled by an attacker.
If the thief finds certain key phrases, it sends the picture to the attackers.


_Blackboard_Alamy.jpg%3Fwidth%3D1280%26auto%3Dwebp%26quality%3D80%26format%3Djpg%26disable%3Dupscale&w=3840&q=75)



.webp&w=3840&q=75)


