Set as Homepage - Add to Favorites

九九视频精品全部免费播放-九九视频免费精品视频-九九视频在线观看视频6-九九视频这-九九线精品视频在线观看视频-九九影院

【o my got s?zü olan porno izlemek ?irk mi】New malware scans photos on both Android and iOS devices

Cybersecurity researchers at Kaspersky have o my got s?zü olan porno izlemek ?irk miuncovered a new and dangerous malware strain, which they believe has been active since at least Feb. 2024.

Dubbed SparkKitty, the malware is part of the broader SparkCat family — a line of Trojan horse programs designed to steal cryptocurrency from unsuspecting users. Kaspersky first discovered the original SparkCat malware in Jan. 2025, noting that it had already made its way onto both the Google Play Store and Apple’s App Store.

SEE ALSO: Scammers tricked TikTok users into downloading malware with AI videos

Like many trojans, these malicious apps disguise themselves as legitimate software. In the crypto world, this can be especially risky. The researchers say that one such Android app, SOEX, posed as a messaging platform with cryptocurrency trading features. They say it racked up more than 10,000 downloads on Google Play before being flagged. Kaspersky researchers found a similar app on the iOS app store, as well as modified versions of the TikTok app posing as the real thing.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

You May Also Like

SparkKitty is specifically engineered to access users’ photo libraries. The reasoning being that many crypto users screenshot their recovery phrases — which are needed to restore access to their wallets — and store them in their camera rolls. By extracting these images, attackers can potentially gain full access to victims’ crypto accounts.

Malware like SparkKitty is built to scan for images that could be valuable to attackers. However, unlike its more targeted predecessor, SparkCat, SparkKitty isn’t especially selective — it scoops up a broad range of images and sends them back to the attackers, regardless of content, according to a detailed report on Secure List by Kapersky.


Related Stories
  • Beware of AI tools being advertised on Facebook. They could be malware in disguise.
  • Hackers leak 86 million AT&T customer records with 44 million social security numbers, report says
  • Coinbase confirms data breach with hackers demanding $20 million ransom

While the primary concern remains the theft of crypto wallet recovery phrases, broader access to users’ photo libraries opens the door to other risks, including potential extortion using sensitive or private images. That said, there appears to be no evidence that the stolen images have been used for blackmail or similar schemes.

Kaspersky reports that the malware campaign has primarily targeted users in Southeast Asia and China. Most of the infected apps were disguised as Chinese gambling games, TikTok clones, and adult entertainment apps, all tailored to users in those regions.

Topics Cybersecurity

0.152s , 8195.5703125 kb

Copyright © 2025 Powered by 【o my got s?zü olan porno izlemek ?irk mi】New malware scans photos on both Android and iOS devices,Data News Analysis  

Sitemap

Top 主站蜘蛛池模板: 欧美人另是日本人妖 | 91精品人成在线观看 | 国产精品毛多多水多 | 91香蕉 | 国产又黄又爽刺激视频 | 夜夜夜精品视频 | 亚洲一区二区三区丝袜 | 欧美不卡一卡二 | 日日摸夜夜添欧美一区 | 国产精品v片在线观看不卡 国产亚洲精品午夜福利 | 国产suv精二区69 | 最新国产精品亚洲 | 国产午夜福利电影免费在线观看 | 国产全黄三级国产全黄三级书 | 大地影院高清mv在线观看 | 日韩中文字幕高清一区 | 羞羞视频免费入口网站 | 青青河边草免费高清电影 | 日本欧美韩国一区二区三区 | 菠萝蜜视频 | 免费视频专区一国产盗摄 | 欧美性色欧美a在线播放 | 99久re热视频这里只有精品6 | 亚洲精品一品区二品区三区 | 国产一级一片免费播放 | 天天射天天爱天天射干 | 自拍偷拍亚洲 | 久热九九| 国产日韩欧美高清一区二区三区 | 亚洲色妇网站 | 噼里啪啦的视频免费观看 | 初爱免费视| 亚洲国产性夜夜综合 | 欧美精品网站一区二区三区 | 视频在线观看国 | 国产精品综合日韩精品第一页 | 国产日韩一区 | 午夜伦情电午夜伦情电影 | 国产在线乱子伦一区 | 亚洲欧美春色激情另类 | 中字幕一区二区三区乱 |