Kaspersky experts have discovered a new virus named SparkCat that is spreading on the App Store and Google Play, infecting apparently safe apps. This malware is concerning because it can view images and decipher texts from the user’s mobile gallery, potentially accessing sensitive information like passwords and credit card details from screenshots without the user’s awareness.
You need to know a brief summary of the information.
- SparkCat is distributed through counterfeit applications that appear to be authentic services.
- The virus utilizes AI to extract text from images and obtain passwords from screenshots.
- It is challenging to identify and can impact users globally, as it is a frequent permission request.
Users are being frightened by the SparkCat Virus.
SparkCat operates covertly by requesting permission to access the photo gallery, a typical request made by many legitimate apps. It employs an OCR system to detect keywords like usernames and passwords, decodes the data, and then sends it to malicious actors.
The virus has been detected in various types of applications, including communication apps, delivery services, and virtual assistants, making it difficult for users to identify the threat until it’s too late, as stated by Kaspersky expert Sergey Puzan.
Researcher Dmitry Kalinin cautioned that this virus is highly challenging to detect, as it can remain on the device for months without displaying any noticeable symptoms, quietly gathering information unbeknownst to the victim.
SparkCat primarily targets users from Europe, Asia, and the United Arab Emirates, but has also been detected in other countries, including those where Portuguese is spoken. Due to its ability to recognize multiple languages, any user who stores passwords or financial details in screenshots may be vulnerable to the virus.
The expert advises against downloading unfamiliar apps, checking app permissions, and updating mobile antivirus. It is suggested to reconsider the habit of saving important information in print to avoid falling victim to SparkCat.