JAKARTA - Kaspersky Threat Research discovered a new Stealer Trojan, SparkCat, which has been active on AppStore and Google Play since March 2024, and is spreading through official applications.

Even on Google Play, Kaspersky found that the app had been downloaded more than 242,000 times, with the main target users in the UAE, Europe, and Asia.

SparkCat uses machine learning that can scan image galleries and steal screenshots containing the phrase recovery of crypto asset wallets. So that the security system is not detected.

When analyzing the Android version of the malware, Kaspersky experts discovered comments in a code written in Mandarin.

In addition, the iOS version contains the names of the developer's homehead, qiongwu and quiwengjing, which show that the threat actors behind the campaign are fluent in Mandarin. However, there is not enough evidence to link the campaign to certain cybercriminals.

SparkCat malware can also find and extract other sensitive data in images, such as passwords. To avoid falling victim to this malware, Kaspersky recommends the following safety measures:


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)