Cybersecurity researchers at Kaspersky have wife humiliatin husband sex videouncovered a new and dangerous malware strain, which they believe has been active since at least Feb. 2024.
Dubbed SparkKitty, the malware is part of the broader SparkCat family — a line of Trojan horse programs designed to steal cryptocurrency from unsuspecting users. Kaspersky first discovered the original SparkCat malware in Jan. 2025, noting that it had already made its way onto both the Google Play Store and Apple’s App Store.
SEE ALSO: Scammers tricked TikTok users into downloading malware with AI videosLike many trojans, these malicious apps disguise themselves as legitimate software. In the crypto world, this can be especially risky. The researchers say that one such Android app, SOEX, posed as a messaging platform with cryptocurrency trading features. They say it racked up more than 10,000 downloads on Google Play before being flagged. Kaspersky researchers found a similar app on the iOS app store, as well as modified versions of the TikTok app posing as the real thing.
SparkKitty is specifically engineered to access users’ photo libraries. The reasoning being that many crypto users screenshot their recovery phrases — which are needed to restore access to their wallets — and store them in their camera rolls. By extracting these images, attackers can potentially gain full access to victims’ crypto accounts.
Malware like SparkKitty is built to scan for images that could be valuable to attackers. However, unlike its more targeted predecessor, SparkCat, SparkKitty isn’t especially selective — it scoops up a broad range of images and sends them back to the attackers, regardless of content, according to a detailed report on Secure List by Kapersky.
While the primary concern remains the theft of crypto wallet recovery phrases, broader access to users’ photo libraries opens the door to other risks, including potential extortion using sensitive or private images. That said, there appears to be no evidence that the stolen images have been used for blackmail or similar schemes.
Kaspersky reports that the malware campaign has primarily targeted users in Southeast Asia and China. Most of the infected apps were disguised as Chinese gambling games, TikTok clones, and adult entertainment apps, all tailored to users in those regions.
Topics Cybersecurity
Jokey Tinder profiles are ruining the internet (and online dating, for that matter)The 30 best cat breeds, rankedWarning: The behindHow an Instagram post about 'saggy boobs' led to a global movement to empower womenPolice rescue group of women stranded on a unicorn floatThe people have spoken and they want to eat the diseased tomb cheeseMichael Moore's 'Fahrenheit 11/9' revealed with bombastic trailer: WatchWarning: The behindRyan Reynolds just tweeted 12 words to describe his gin, and they're ridiculously perfectAshanti shared the most perplexing Aretha Franklin tribute we could have imagined You can now talk to Google's AI podcast hosts Best Home Depot deals: Save big on backyard items and much more Department of Defense announces $100 million generative AI push Wordle today: The answer and hints for December 13 Here's why there are orcs in 'The Lord of the Rings: The War of the Rohirrim' REI 4th of July Sale: Best REI deals Phoenix Suns vs. Utah Jazz 2024 livestream: Watch NBA online Etsy to ban sale of most sex toys, explicit content, and more TikTok Book Awards 2024: Check out the shortlist Blink Outdoor 4 deal: Get $130 off at Amazon
0.1934s , 14309.4609375 kb
Copyright © 2025 Powered by 【wife humiliatin husband sex video】New malware scans photos on both Android and iOS devices,Global Hot Topic Analysis