Emerging Threat: SparkCat Malware
Cybersecurity experts have come across an alarming new technique that cybercriminals are exploiting to steal cryptocurrencies, and it involves an unexpected target: your smartphone’s photo gallery. Researchers have identified a sophisticated strain of malware named SparkCat, which has evaded security checks on both major app platforms—Apple’s App Store and Google Play Store.
About SparkCat
SparkCat, a Trojan horse malware, first emerged in February 2025, and its latest variant is skillfully designed to masquerade as benign apps. This malware is particularly dangerous as it aims to extract a user’s cryptocurrency wallet recovery phrase, effectively allowing hackers to access and deplete their funds.
Recent Actions and Distribution
In light of these findings, cybersecurity analysts have successfully removed two malicious applications from the iOS App Store and one from Google Play Store. However, it is important to note that SparkCat can also be found on unauthorized third-party sites, widening its distribution.
How SparkCat Operates
The attack method employed by this malware is particularly clever: it requests permissions to access a user’s media files, then silently scans images using an optical character recognition (OCR) feature. If it identifies certain keywords related to sensitive information, the malware transmits these images back to the attackers’ servers.
Recommendations for Users
Given this threat, it is prudent for smartphone users to refrain from storing sensitive information—like cryptocurrency recovery phrases—in their photo galleries. Instead, experts advise keeping digital records in secure, encrypted applications to mitigate risks. Additionally, users should exercise caution when granting permissions for pictures or files to new applications, as this could further expose them to malware like SparkCat.