Cybersecurity researchers have uncovered a highly sophisticated method hackers are using to drain cryptocurrency wallets. This method targets a vulnerability most people do not even think about: the photo gallery on your smart phone.
A new evolving strain of malware known as SparkCat has bypassed security reviews on both the Apple App Store and the Google Play Store.
SparkCat, explained
SparkCat is a Trojan malware that was originally discovered in February 2025. The bad actors have released a heavily disguised version of the virus.
HOT Stories Hyperliquid Whale Sells Five Million XRP in 20x Short Deal, Japanese Bitcoin Researchers See $10,000 BTC as Worst-Case Scenario, Ethereum Foundation Stakes Nearly $100 Million in Ether: Morning Crypto Report Shiba Inu's (SHIB) Last Chance, Will XRP Hit $2 Again? Bitcoin (BTC) Bull Run Denied, Could $60,000 Be Next? Crypto Market Review
SparkCat is meant to find and steal a user's crypto wallet recovery phrase that makes it possible to drain all the funds.
You Might Also Like
Thu, 04/02/2026 - 11:24 Ledger CTO Urges Community to Increase Crypto Security After Recent Solana Dex HackByYuri Molchan
The malware does not look like a virus. Instead, the developers hide the malicious code inside seemingly harmless applications.
The researchers identified and removed two infected apps from the iOS App Store and one from the Google Play Store. The malware is also distributed via third-party websites.
The malware executes a highly effective attack that involves requesting permissions, performing silent scanning and reading the images with the help of an optical character recognition (OCR) module.
If the OCR technology detects specific keywords, it immediately sends that specific image to the attacker's remote server.
How to protect yourself?
Treating your camera roll like a notepad is obviously not a good idea. One should avoid taking or storing screenshots of sensitive information (especially cryptocurrency wallet recovery phrases).
If you must keep digital copies of important documents or passwords, store them in an encrypted application.
One should always exercise extreme caution when granting photo or file permissions to new apps.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。