SparkKitty Spyware Targets iOS and Android Devices via App Stores

Cybersecurity researchers have identified a sophisticated spyware campaign named SparkKitty, which has successfully infiltrated both Apple’s App Store and Google Play Store. This marks a significant escalation in mobile malware distribution through official channels, building on the previously discovered SparkCat campaign while expanding its reach across both major mobile platforms.
SparkKitty employs versatile attack vectors, spreading through official app stores, unofficial sources, and modified applications. Active since at least February 2024, the campaign aims to compromise mobile users globally, particularly in Southeast Asia and China, by targeting applications like Chinese gambling games, TikTok modifications, and adult-oriented apps.


Technical Implementation and Objectives
On iOS devices, the malware delivers its payload through frameworks that mimic legitimate networking libraries, such as AFNetworking and Alamofire, while using obfuscated libraries disguised as system components. The Android variant operates through Java and Kotlin implementations, with some versions functioning as malicious Xposed modules.
The primary goal of SparkKitty is to steal photographs from infected devices, particularly images containing cryptocurrency wallet seed phrases. Unlike its predecessor, SparkCat, which used optical character recognition to target specific content, SparkKitty indiscriminately collects all accessible images from device galleries, suggesting a broader strategy to capture valuable financial information.


Persistence Mechanisms
The technical sophistication of SparkKitty is evident in its implementation. On iOS, it leverages Objective-C’s automatic class loading mechanism to execute malicious code when applications launch. The malware verifies its environment by checking a specific key in the application’s Info.plist file before activating its payload.
Once verified, SparkKitty retrieves and decrypts a Base64-encoded configuration using AES-256 encryption, which contains command and control server addresses for exfiltration. The malware establishes communication with its C2 infrastructure to receive authorization codes before systematically accessing the device’s photo gallery and uploading stolen images.
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (483)
- Tips (79)
- Google (28)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (49)
- Malware Alerts (226)
- Cyber Attack (285)
- Data Backup (13)
- Data Breach (116)
- Phishing (163)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (70)
- Android Security (74)
- Knoweldgebase (38)
- Botnet (16)
- Updates (4)
- Alert (71)
- Hacking (67)
- Social Media (8)
- vulnerability (68)
- Hacker (36)
- Spyware (11)
- Windows (8)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (8)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (6)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (9)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (29)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (17)