SparkCat Crypto Stealer Returns to iOS and Android App Stores
Kaspersky discovers new SparkCat malware variants on Apple App Store and Google Play that use OCR to steal cryptocurrency wallet recovery phrases from photo galleries.
The SparkCat malware has resurfaced on both the Apple App Store and Google Play Store with upgraded evasion capabilities, more than a year after researchers first documented the crypto-stealing trojan. Kaspersky researchers identified the new variants in early April 2026, hidden within seemingly legitimate applications.
How SparkCat Steals Your Crypto
SparkCat is an OCR-based trojan that scans victims' photo galleries for cryptocurrency wallet recovery phrases. Many users screenshot their wallet seed phrases for backup purposes—a practice security experts have long warned against. SparkCat exploits this habit by using optical character recognition to identify and exfiltrate these images to attacker-controlled servers.
The malware disguises itself within everyday apps like enterprise messengers and food delivery services. Kaspersky found two infected apps on the App Store and one on Google Play, though the specific app names weren't disclosed to prevent tipping off the operators.
Platform-Specific Targeting
The Android variant focuses on Asian cryptocurrency users, scanning for Japanese, Korean, and Chinese keywords in photo metadata and image content. This regional targeting aligns with the high cryptocurrency adoption rates across East Asia.
The iOS version takes a broader approach, scanning for English-language wallet mnemonics. This makes the iOS variant potentially more dangerous globally, as English seed phrases are used by cryptocurrency holders regardless of their region.
This isn't the first time mobile app stores have hosted crypto-stealing malware. We covered the NoVoice Android rootkit last week, which infected 2.3 million devices through Google Play before detection. Mobile app stores continue to struggle with vetting submissions that hide malicious functionality behind legitimate-looking interfaces.
Technical Evolution
The updated SparkCat variants incorporate code virtualization and cross-platform programming languages to frustrate reverse engineering efforts. These obfuscation layers represent a significant upgrade from the original 2025 versions, indicating active development by the malware operators.
Kaspersky attributes SparkCat to Chinese-speaking threat actors based on code artifacts and infrastructure patterns observed across multiple campaigns. The group appears focused exclusively on cryptocurrency theft, with no evidence of broader espionage or data collection objectives.
Why This Matters
Cryptocurrency theft through mobile malware has accelerated in 2026 as threat actors chase the growing pool of retail crypto holders. The CrystalX RAT we reported on earlier this week used similar wallet-targeting techniques, demonstrating that crypto theft has become a standard feature in modern infostealer kits.
SparkCat's presence on official app stores is particularly concerning. Users generally trust apps downloaded from Apple and Google's curated marketplaces, creating a false sense of security that malware authors exploit. Both companies employ automated scanning and manual review processes, but sophisticated malware continues to slip through.
The photo gallery attack vector is clever. Users who understand the risks of storing seed phrases in password managers or cloud storage may not realize that local photo galleries are equally vulnerable. Once SparkCat gains photo access permissions—a common request from legitimate apps—it can silently scan every image on the device.
Protecting Your Crypto Assets
Security researcher Sergey Puzan from Kaspersky recommends using mobile security solutions that can detect malicious behavior patterns. Beyond that:
- Never screenshot recovery phrases - Write them on paper and store physically
- Audit app permissions - Question why a food delivery app needs photo gallery access
- Use hardware wallets - For significant holdings, cold storage eliminates this attack surface
- Enable app verification - Both iOS and Android offer settings to flag potentially harmful apps
Organizations allowing personal devices for work should consider mobile threat defense solutions, particularly if employees have access to corporate cryptocurrency wallets or financial systems. The line between personal crypto theft and corporate compromise is thin when the same device accesses both.
For those already affected, Kaspersky notes the malware exfiltrates images containing seed phrases, not the phrases themselves. Attackers still need to manually process stolen images, creating a window for victims to transfer funds to new wallets if they catch the infection early.
Related Articles
ZeroDayRAT Spyware Grants Full Access to Mobile Devices
Commercial mobile spyware on Telegram offers live surveillance, OTP interception, and crypto theft across Android 5-16 and iOS up to version 26.
Feb 10, 2026NoVoice Rootkit Infected 2.3M Android Devices via Play
McAfee discovered NoVoice malware hiding in 50+ Google Play apps, using 22 exploits to root devices and clone WhatsApp sessions. Factory reset won't remove it.
Apr 3, 2026AuraStealer Spreads Via TikTok Videos Posing as Software Tutorials
Russian-linked AuraStealer infostealer operates 48 C2 domains, steals crypto wallets and 2FA tokens, and spreads through fake software activation videos on TikTok.
Apr 1, 2026Torg Grabber Steals from 728 Crypto Wallets via ClickFix
New Torg Grabber infostealer targets 728 cryptocurrency wallet extensions and 103 password managers. Spreads via ClickFix clipboard hijacking with Cloudflare-based exfiltration.
Mar 26, 2026