Cybersecurity researchers have made a disturbing discovery, uncovering a new variant of the SparkCat malware lurking in apps on both the Apple App Store and Google Play Store.

This malicious software has been cleverly disguised within seemingly harmless applications, including enterprise messengers and food delivery services, to evade detection and exploit unsuspecting users.

The SparkCat malware is designed to capture images of crypto wallet recovery phrases, allowing hackers to gain unauthorized access to sensitive financial information and potentially drain the victim’s cryptocurrency accounts.

The reappearance of SparkCat, over a year after its initial discovery, highlights the evolving nature of mobile malware and the need for users to remain vigilant when downloading and using apps on their iOS and Android devices.

To protect themselves from such threats, users are advised to exercise caution when installing new apps, monitor their device’s behavior for signs of malware, and keep their operating systems and security software up to date.

As the threat landscape continues to shift, it is essential for individuals and organizations to prioritize mobile security and stay informed about the latest malware variants and vulnerabilities, such as CVEs related to mobile operating systems and apps.

Source: Original Article