Article Details

Scrape Timestamp (UTC): 2025-02-07 03:09:16.876

Source: https://www.theregister.com/2025/02/07/infected_apps_google_apple_stores/

Original Article Text

Click to Toggle View

Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims. OCR plugin great for extracting crypto-wallet secrets from galleries. Kaspersky eggheads say they’ve spotted the first app containing hidden optical character recognition spyware in Apple’s App Store. Cunningly, the software nasty is designed to steal cryptocurrency. The researchers found the malware in an iOS app called ComeCome, which is also available from Google’s Play store, and claims to offer food delivery services. According to Kaspersky's Dmitry Kalinin and Sergey Puzan, the application also delivers the keys to victims’ crypto holdings to crooks. The app can do that as, according to Kaspersky’s analysts this week, it is “embedded with a malicious SDK/framework” that at an unspecified moment decrypts an optical character recognition (OCR) plugin. Once that OCR code is running, the app hunts for screenshots on mobile devices in the hope that some include cryptocurrency wallet recovery phrases, aka seed phrases, that the OCR will extract and the spyware will exfiltrate. With those stolen seed phrases in hand, the app's masterminds can take control of victims' wallets, and transfer funds out of them. That's why your seed phrase needs to be kept a secret, offline and not as an image on your phone. "Our investigation revealed that the attackers were targeting crypto wallet recovery phrases, which were sufficient for gaining full control over a victim's crypto wallet to steal the funds," Team Kaspersky wrote. “Unfortunately, despite rigorous screening by the official marketplaces and general awareness of OCR-based crypto wallet theft scams, the infected apps still found their way into Google Play and the App Store,” the duo added, before noting the apps may have evaded checks because they offer “no indication of a malicious implant hidden within the app” and may appear harmless. “This case once again shatters the myth that iOS is somehow impervious to threats posed by malicious apps,” they opined. The duo dubbed the seed-snatching malware SparkCat, and noted it "is flexible enough to steal not just these phrases but also other sensitive data from the gallery, such as messages or passwords that might have been captured in screenshots." The cryptocurrency-stealing effort targets "at a minimum" Android and iOS users in Europe and Asia, says Team Kaspersky. More than one app in the Google Play store contains SparkCat, we're told, and these were downloaded more than 242,000 times. Neither Google nor Apple responded to The Register's requests for comment. The analysts cannot confirm whether SparkCat was slipped into these applications in a supply-chain attack or as a deliberate act by the apps' developers. Apple has removed the malicious ComeCome application from the iOS store, says Kaspersky. We note it's also disappeared from Google Play along with others named by the Russian lab. SparkCat refers to a highly obfuscated module called Spark within the malicious apps. The spyware is mostly written in Java and uses an unidentified protocol implemented in Rust to communicate with its remote command-and-control (C2) server. After connecting to its C2 server, the Android version of Spark downloads and uses a wrapper for the TextRecognizer interface in Google's ML Kit library to perform the character extraction from images. The malware loads different OCR models depending on the system language that recognizes Latin, Korean, Chinese, or Japanese characters in pictures. If a mark engages with a poisoned app's support team – interactions made possible with the legitimate third-party Easemob HelpDesk SDK – the software requests access to the device's photo gallery. If access is granted, it scans screenshots using OCR to extract crypto wallet recovery phrases and sends them to the C2 server. The app’s developers are therefore hoping users do two things: Grant access to the gallery after taking screenshots of recovery phrases. Sadly, it appears there are enough users who will make those mistakes to make the effort of creating these apps worthwhile.

Daily Brief Summary

MALWARE // Malicious App Steals Crypto Wallet Keys via OCR Technology

Kaspersky researchers discovered a new malware, named SparkCat, embedded in the ComeCome iOS app, which has also been found in Google’s Play Store.

The malware uses an OCR plugin to scan screenshots stored on mobile devices for cryptocurrency wallet recovery phrases, which are then exfiltrated to take over victims' wallets.

Despite stringent checks by app stores, the infected apps containing SparkCat managed to slip through, with no external signs of malicious content.

The compromised apps, according to Kaspersky, were particularly targeting users in Europe and Asia, with downloads exceeding 242,000 times across various apps.

The sophisticated nature of SparkCat allows it to steal other sensitive information besides seed phrases, further endangering user privacy.

Neither Google nor Apple had responded to inquiries about the presence of these malware-infected apps at the time of discovery.

The Android version of the malicious app further interacts with Google's ML Kit for text recognition and communicates with a C2 server using a protocol written in Rust for data extraction and transmission.

Apple has since removed the ComeCome app from its store, and similar actions have been reported on Google Play.