{"id":24204,"date":"2025-06-23T12:18:39","date_gmt":"2025-06-23T08:18:39","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24204"},"modified":"2025-06-23T12:18:39","modified_gmt":"2025-06-23T08:18:39","slug":"ios-android-stealer-sparkkitty","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/24204\/","title":{"rendered":"Your cat pics are at risk: the threat posed by the new SparkKitty Trojan"},"content":{"rendered":"<p>Your snapshots are, quite literally, the keys to your private life. Your gallery holds your future plans, financial secrets, cat pictures, and sometimes even things you\u2019d never share with anyone. But how often do you truly think about protecting those images? We hope that ever since you heard about the <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkCat cross-platform stealer<\/a>, you\u2019ve been pondering it more often than usual.<\/p>\n<p>Now we\u2019ve discovered that Trojan\u2019s little sibling, which we\u2019ve affectionately named SparkKitty. But don\u2019t let the cute name fool you \u2014 behind it lies a spy that, like its older brother, aims to steal photos from its victims\u2019 smartphones. What makes this threat unique, and why should both Android and iPhone users prick up their ears?<\/p>\n<h2>How SparkKitty makes its way onto devices<\/h2>\n<p>The stealer spreads in two ways: (i) in the wild \u2014 that is, across the untamed parts of the internet; and (ii) through official app stores like the App Store and Google Play. Let\u2019s break this down.<\/p>\n<h3>Official app stores<\/h3>\n<p>In Apple\u2019s App Store, the malware was lurking inside the <strong>\u5e01<\/strong><strong>coin<\/strong> app \u2014 designed for tracking cryptocurrency rates and trading signals. We\u2019re not sure exactly how this suspicious spy activity ended up in the app. It\u2019s possible there was a <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-what-are-they-and-how-to-manage-the-risk\/52852\/\" target=\"_blank\" rel=\"noopener nofollow\">supply-chain compromise<\/a>, and the developers themselves weren\u2019t aware of SparkKitty until we notified them. But there\u2019s also a second possibility: the developers deliberately embedded the stealer into the app. Regardless, this is the second time we\u2019ve seen a Trojan sneak into the App Store, and we\u2019ve alerted Apple about it. <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkCat<\/a> was the first instance.<\/p>\n<div id=\"attachment_53680\" style=\"width: 483px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/23120633\/ios-android-stealer-sparkkitty-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53680\" class=\"size-large wp-image-53680\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/23120633\/ios-android-stealer-sparkkitty-01-473x1024.jpg\" alt=\"Infected application in the App Store\" width=\"473\" height=\"1024\"><\/a><p id=\"caption-attachment-53680\" class=\"wp-caption-text\">Infected application in the App Store<\/p><\/div>\n<p>It\u2019s a different story with Google Play: malicious apps pop up on a regular basis, and we <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=google+play\" target=\"_blank\" rel=\"noopener nofollow\">frequently cover these threats<\/a> on Kaspersky Daily. This time, we detected malicious activity in a messaging app that includes crypto-exchange features. This is a popular app that\u2019s been installed more than 10\u00a0000 times, and was still available in the store at the time of the study. We\u2019ve contacted Google to warn them about the threat.<\/p>\n<h3>Suspicious links in the wild<\/h3>\n<p>That said, the attackers have been much more creative this time in spreading the malware out in the wild. Once, during a routine review of suspicious links (we click them so you don\u2019t have to!) our experts uncovered several similar pages distributing a TikTok mod for Android. One of the main things this mod did was call additional code. \u201cThat looks suspicious\u201d, we thought. And we were right. The code contained links displayed as buttons within the app, all directing users to an online store called TikToki Mall, which sold a variety of items. Unfortunately, we couldn\u2019t determine if the store was legitimate or just a big trap \u2014 but one interesting fact stood out: TikToki Mall accepts cryptocurrency payments, and you need an invitation code to sign up and pay for any item. We didn\u2019t find any further suspicious activity at this stage, and no traces of SparkKitty or other malware.<\/p>\n<p>So we decided to take a different approach and see what happened when we tapped these same suspicious links from an iPhone. This led us to a page that vaguely resembled the App Store, which immediately prompted us to download the \u201cTikTok app\u201d.<\/p>\n<blockquote><p><em>iOS doesn\u2019t allow users to download and run applications from third-party sources. However, Apple provides so-called provisioning profiles to every member of the Apple Developer Program. These allow installing custom applications not available in the App Store on user devices, such as beta versions or apps developed for internal corporate use. Attackers exploit these profiles to distribute apps that contain malware.<\/em><\/p><\/blockquote>\n<p>The installation process differed slightly from the usual procedure. Typically, in the App Store, you only need to tap <strong>Install<\/strong> once, but in this case, installing the fake TikTok required additional steps: downloading and installing a developer provisioning profile.<\/p>\n<div id=\"attachment_53679\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/23120708\/ios-android-stealer-sparkkitty-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53679\" class=\"size-large wp-image-53679\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/06\/23120708\/ios-android-stealer-sparkkitty-02-1024x739.jpg\" alt=\"Installing an app from an unknown source on an iPhone \" width=\"1024\" height=\"739\"><\/a><p id=\"caption-attachment-53679\" class=\"wp-caption-text\">Installing an app from an unknown source on an iPhone<\/p><\/div>\n<p>Naturally, this version of TikTok didn\u2019t have any funny videos; it was just another store, similar to the Android version. While seemingly harmless, the iOS version requested access to the user\u2019s gallery every time it launched \u2014 and that was the catch. This led us to discover a malicious module that sent images from the infected phone\u2019s gallery, along with device information, to the attackers. We also found its traces in other Android applications. For the technical details of the story, check out our <a href=\"https:\/\/securelist.com\/sparkkitty-ios-android-malware\/116793\/\" target=\"_blank\" rel=\"noopener\">full report on Securelist<\/a>.<\/p>\n<h2>Who\u2019s at risk?<\/h2>\n<p>Our data shows that this campaign primarily targets users in Southeast Asia and China. That doesn\u2019t mean, however, that other countries are beyond the reach of SparkKitty\u2019s claws. The malware has been spreading since at least early 2024, and over the past year and a half attackers have likely considered upscaling their operation to other countries and continents. There\u2019s nothing stopping them. What\u2019s more, it\u2019s not just the TikTok mod you should worry about; we\u2019ve also found malicious activity inside various gambling and adult games, and even crypto-related apps.<\/p>\n<p>If you think these attackers are just interested in admiring your vacation photos, think again. SparkKitty uploads each and every one of your snapshots to its command-and-control server. Those images could easily include screenshots of sensitive information like crypto wallet seed phrases, allowing these bad actors to steal your cryptocurrency.<\/p>\n<h2>How to protect yourself from SparkKitty<\/h2>\n<p>This Trojan spreads in many ways, and protecting yourself from every single one is a tough challenge. While the golden rule of \u201cdownload apps from official sources only\u201d still applies, we\u2019ve found traces of this stealer in both Google Play and the App Store \u2014 places where apps are supposedly vetted and 100% safe. So what can you do about that?<\/p>\n<p>We recommend focusing on securing your smartphone\u2019s gallery. Naturally, the most foolproof method would be to never take photos or screenshots of sensitive information, but that\u2019s virtually impossible nowadays. There\u2019s a solution: store valuable photos in a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">secure vault<\/a>. With <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, you can only view and send protected, important photos after entering the main password, which <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/%23:~:text=The%20encryption%20key%20is%20your%20main%20password\" target=\"_blank\" rel=\"noopener nofollow\">only you know<\/a>. Note that the protected content is not confined to just one device. The password manager can sync information between smartphones and computers. This includes bank-card data, two-factor authentication tokens, and anything else you choose to store in <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0\u2013 including your photos.<\/p>\n<p>It\u2019s also crucial to check your smartphone right now for any of the infected apps we\u2019ve discovered; the extended list is <a href=\"https:\/\/securelist.com\/sparkkitty-ios-android-malware\/116793\/\" target=\"_blank\" rel=\"noopener\">available on Securelist<\/a>. For Android, <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> can help with this \u2014 it\u2019ll find and remove malware for you. On iPhone, due to the closed architecture of iOS, <a href=\"https:\/\/me-en.kaspersky.com\/home-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">our security solution<\/a>\u00a0can\u2019t scan for and delete previously installed infected apps, but it will prevent any attempts to send data to the attackers\u2019 servers and warn you about them.<\/p>\n<p>And if you opt for a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0or <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a>\u00a0subscription, you get <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0along with your security solution.<\/p>\n<p>Follow <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">our Telegram channel<\/a>\u00a0to stay up to date on the latest cyberthreats, and make sure you\u2019re storing your photos safely.<\/p>\n<blockquote><p>Learn about other malware you need to watch out for to keep your smartphone safe:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/necro-infects-android-users\/52201\/\" target=\"_blank\" rel=\"noopener nofollow\">How the Necro Trojan attacked 11 million Android users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tria-stealer-wedding-scam\/52958\/\" target=\"_blank\" rel=\"noopener nofollow\">Beware of stealers disguised as\u2026 wedding invitations<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojan embedded in fake Android smartphones<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">SparkCat trojan stealer infiltrates App Store and Google Play, steals data from photos<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/51923\/\" target=\"_blank\" rel=\"noopener nofollow\">LianSpy: new mobile spyware for Android<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>This marks the second time we&#8217;ve found a stealer Trojan in the App Store.<\/p>\n","protected":false},"author":2706,"featured_media":24206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[105,2062,561,183,1061,26,1021,2841,2151,692],"class_list":{"0":"post-24204","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-app-store","11":"tag-crypto","12":"tag-google-play","13":"tag-ios","14":"tag-iphone","15":"tag-kaspersky-password-manager","16":"tag-scams","17":"tag-stealers","18":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/24204\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-android-stealer-sparkkitty\/28974\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/12530\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-android-stealer-sparkkitty\/29086\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/28263\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-android-stealer-sparkkitty\/31087\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-android-stealer-sparkkitty\/29781\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-android-stealer-sparkkitty\/39936\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-stealer-sparkkitty\/13490\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/53675\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-android-stealer-sparkkitty\/22911\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-android-stealer-sparkkitty\/32357\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-android-stealer-sparkkitty\/29301\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-android-stealer-sparkkitty\/35014\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-android-stealer-sparkkitty\/34652\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/stealers\/","name":"stealers"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24204"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24204\/revisions"}],"predecessor-version":[{"id":24208,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24204\/revisions\/24208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24206"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}