Security

Cyber-crime

Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims

OCR plugin great for extracting crypto-wallet secrets from galleries


Kaspersky eggheads say they’ve spotted the first app containing hidden optical character recognition spyware in Apple’s App Store. Cunningly, the software nasty is designed to steal cryptocurrency.

The researchers found the malware in an iOS app called ComeCome, which is also available from Google’s Play store, and claims to offer food delivery services. According to Kaspersky's Dmitry Kalinin and Sergey Puzan, the application also delivers the keys to victims’ crypto holdings to crooks.

The app can do that as, according to Kaspersky’s analysts this week, it is “embedded with a malicious SDK/framework” that at an unspecified moment decrypts an optical character recognition (OCR) plugin. Once that OCR code is running, the app hunts for screenshots on mobile devices in the hope that some include cryptocurrency wallet recovery phrases, aka seed phrases, that the OCR will extract and the spyware will exfiltrate.

With those stolen seed phrases in hand, the app's masterminds can take control of victims' wallets, and transfer funds out of them. That's why your seed phrase needs to be kept a secret, offline and not as an image on your phone.

"Our investigation revealed that the attackers were targeting crypto wallet recovery phrases, which were sufficient for gaining full control over a victim's crypto wallet to steal the funds," Team Kaspersky wrote.

“Unfortunately, despite rigorous screening by the official marketplaces and general awareness of OCR-based crypto wallet theft scams, the infected apps still found their way into Google Play and the App Store,” the duo added, before noting the apps may have evaded checks because they offer “no indication of a malicious implant hidden within the app” and may appear harmless.

“This case once again shatters the myth that iOS is somehow impervious to threats posed by malicious apps,” they opined.

The duo dubbed the seed-snatching malware SparkCat, and noted it "is flexible enough to steal not just these phrases but also other sensitive data from the gallery, such as messages or passwords that might have been captured in screenshots."

The cryptocurrency-stealing effort targets "at a minimum" Android and iOS users in Europe and Asia, says Team Kaspersky. More than one app in the Google Play store contains SparkCat, we're told, and these were downloaded more than 242,000 times. Neither Google nor Apple responded to The Register's requests for comment.

The analysts cannot confirm whether SparkCat was slipped into these applications in a supply-chain attack or as a deliberate act by the apps' developers. Apple has removed the malicious ComeCome application from the iOS store, says Kaspersky. We note it's also disappeared from Google Play along with others named by the Russian lab.

SparkCat refers to a highly obfuscated module called Spark within the malicious apps. The spyware is mostly written in Java and uses an unidentified protocol implemented in Rust to communicate with its remote command-and-control (C2) server.

After connecting to its C2 server, the Android version of Spark downloads and uses a wrapper for the TextRecognizer interface in Google's ML Kit library to perform the character extraction from images. The malware loads different OCR models depending on the system language that recognizes Latin, Korean, Chinese, or Japanese characters in pictures.

If a mark engages with a poisoned app's support team – interactions made possible with the legitimate third-party Easemob HelpDesk SDK – the software requests access to the device's photo gallery. If access is granted, it scans screenshots using OCR to extract crypto wallet recovery phrases and sends them to the C2 server.

The app’s developers are therefore hoping users do two things: Grant access to the gallery after taking screenshots of recovery phrases. Sadly, it appears there are enough users who will make those mistakes to make the effort of creating these apps worthwhile. ®

Send us news
7 Comments

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

Murena kicks Google out of the Pixel Tablet

Privacy-centric Android makes more sense on this form factor than a phone

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it