Bad actors are constantly on the lookout for personal information, ranging from phone numbers to government IDs. Recently, new threats have emerged that specifically target both Android and iPhone users. A notable malware called Sparkkitty is designed to scan private photos and extract sensitive data like cryptocurrency recovery phrases.
What is Sparkkitty Mobile Malware?
Researchers at Kaspersky recently uncovered Sparkkitty, which appears to be an evolution of a prior malware, Sparkcat. This earlier campaign utilized optical character recognition to pull sensitive information from images containing cryptographic recovery phrases. Sparkkitty takes things further; it can upload images from infected devices without triggering an infection alert. This means that it doesn’t just compromise wallet information, but also personal photos stored on the device. While the primary focus is on crypto seed phrases, the potential for misuse of other images is concerning.
Kaspersky’s research indicates that Sparkkitty has been active since at least February 2024, with distribution occurring via both official and unofficial channels, including the Google Play Store and the Apple App Store.
How Sparkkitty Malware Infects Android and iPhone Devices
Kaspersky found Sparkkitty hidden in several apps, such as Coin on iOS and Soex on Android, both of which have since been removed from their respective app stores. Soex, a messaging app related to cryptocurrency, had gained over 10,000 downloads before it was taken down. For iOS devices, attackers often deliver malware through fake software frameworks or enterprise profiles. Once installed, the malware activates as soon as the app launches, monitoring users’ photo libraries. On Android, Sparkkitty disguises itself within apps coded in Java or Kotlin and activates through specific triggers, eventually uploading images and device metadata.
Why Sparkkitty is More Dangerous Than Previous Malware
Unlike traditional spyware, which often collects data in a less targeted manner, Sparkkitty zeroes in on photos, especially those containing sensitive information such as cryptocurrency recovery phrases or personal IDs. Its ability to bulk-upload images significantly enhances criminals’ capacity to gather valuable personal data.
4 Ways to Protect Your Phone from Mobile Malware
1) Stick to trustworthy developers: Avoid vague apps, especially those with few reviews. Always check the developer’s history before downloading.
2) Review app permissions: Be cautious of apps that ask for access to photos or messages without a valid reason. If it feels off, deny access or uninstall.
3) Keep your device updated: Install updates promptly as they often fix vulnerabilities that malware exploits.
4) Use mobile security software: Installing a strong antivirus on your devices is crucial for protection against malicious software. Look up the best antivirus options for 2025 for Windows, Mac, Android, and iOS devices.
Key Takeaways
While Apple and Google have removed affected apps following warnings, there are still questions about how Sparkkitty was able to bypass their review processes initially. As app stores grow and become more intricate, the tools for screening must advance as well. Otherwise, similar issues are likely to persist.
Do you think that Google and Apple are adequately protecting users from mobile malware? Share your thoughts with us.





