Publish
Global iGaming leader
iGaming leader platform:
Home>News channel>News details

iPhone Users Must See! 43 Malicious Apps Invade App Store, Scanning User Albums to Steal Data (Including App List)

PASA News
PASA News
·Mars

Users of the popular Thai delivery app Wukong, beware of grey market activities and keep your wallets safe.

iPhone users, take note! Recently, the international cybersecurity firm Kaspersky has issued a warning that several apps on the App Store and Google Play have been infiltrated by malware. These apps scan users' photo albums to steal data, and downloading them could lead to the leakage of personal privacy and even banking passwords!

43 malicious apps infiltrate the App Store, scanning users' photo albums to steal data

Researchers at Kaspersky have recently discovered that some apps on the App Store and Google Play have been embedded with a malware called "SparkCat". In the App Store alone, as many as 43 apps have been infected.

This malware requests access to the device's photos and screenshots, and once permission is granted, "SparkCat" activates built-in Optical Character Recognition (OCR) to scan and analyze all the content in the photo album. It then uses keywords obtained from a remote server to filter information and steal various chat logs, bank account passwords, credit card details, and other important information.

The researchers suggest that "SparkCat" may have invaded the App Store platform through an infected software development kit (SDK), allowing some developers to embed malicious code into their apps unknowingly. There are even criminals who deliberately develop new apps and use free AI services to attract victims to download them.

List of affected apps on App Store/Google Play

The researchers also revealed that "SparkCat" mainly targets users in Asia and Europe, and have published a list of infected apps on the App Store and Google Play, as follows:

List of affected apps on the App Store

· im.pop.app.iOS.Messenger (IM+)

· com.hkatv.ios (ATV Asian Television)

· com.atvnewsonline.app (ATV News Online)

· io.zorixchange (Zorix Exchange)

· com.yykc.vpnjsq (VPN Accelerator)

· com.llyy.au (App usage in Australia, specifics unknown)

· com.star.har91vnlive (Star HAR91VN Live)

· com.jhgj.jinhulalaab (Jinhu Lalaab)

· com.qingwa.qingwa888lalaaa (Frog Qingwa)

· com.blockchain.uttool (UT Tool or OGIUT)

· com.wukongwaimai.client (Wukong Delivery)

· com.unicornsoft.unicornhttpsforios (Unicorn HTTPS)

· staffs.mil.CoinPark (Military-related institution's undisclosed app)

· com.lc.btdj (Some BTDJ tool abbreviation)

· com.baijia.waimai (BAIJIA Baijia Delivery)

· com.ctc.jirepaidui (Possibly "Quick Queue")

· com.ai.gbet (AI-related app)

· app.nicegram (Nicegram)

· com.blockchain.ogiut (Blockchain-related)

· com.blockchain.98ut (Blockchain-related)

· com.drenm.towncn (Dream Town)

· com.mjb.Hardwood.Test (MJB's Hardwood test app)

· com.galaxy666888.ios (Game or tool)

· njiujiu.vpntest (Jiujiu VPN)

· com.qqt.jykj (JYKJ possibly related to educational technology)

· com.ai.sport (AI Sport)

· com.feidu.pay (Feidu Payment)

· app.ikun277.test (ikun277 test tool)

· com.usdtone.usdtoneApp2 (USDT One)

· com.cgapp2.wallet0 (CG Wallet)

· com.bbydqb (BBYDQB)

· com.yz.Byteswap.native (Byteswap)

· jiujiu.vpntest (Same as njiujiu.vpntest)

· com.wetink.chat (WeTink Chat)

· com.websea.exchange (WebSea Exchange)

· com.customize.authenticator (Custom Authenticator)

· im.token.app (Token.im Cryptocurrency Wallet)

· com.mjb.WorldMiner.new (World Miner)

· com.kh-super.ios.superapp (KH Super App)

· com.thedgptai.event (DGPT Tool)

· com.yz.Eternal.new (Eternal App)

· xyz.starohm.chat (Starohm Chat)

· com.crownplay.luckyaddress1 (Crown Play Lucky Address)

List of affected apps on Google Play

· com.crownplay.vanity.address

· com.atvnewsonline.app

· com.bintiger.mall.android

· com.websea.exchange

· org.safew.messenger

· org.safew.messenger.store

· com.tonghui.paybank

· com.bs.feifubao

· com.sapp.chatai

· com.sapp.starcoin

PS: Many people have said that it's impossible for cold wallet exchanges downloaded from the Apple App Store to be fake, but the tactic of stealing data is indeed hard to guard against. Whether it's VPNs, delivery apps, payment apps, blockchain, game apps, or wallet apps, your U is clearly lost.

菲律宾
菲律宾
泰国
泰国
#行业干货#其他#产业#盗U应用AIiPhoneAIKasperskyAIMalwareAISparkCat

Risk Warning: All news content is created by users. Please maintain an objective stance and discern the content viewpoint on your own.

PASA News
PASA News
210share
USDT Theft Storm: Malicious APPs Become New Weapon for USDT Theft, How Users Can Defend Themselves

USDT Theft Storm: Malicious APPs Become New Weapon for USDT Theft, How Users Can Defend Themselves

13 articles·50.6k views
Sign in to Participate in comments

Comments0

Post first comment~

Post first comment~