Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Analyst: Malicious Virus SparkKitty Detected Stealing Wallet Mnemonics, Primarily Targeting Users in China and Southeast Asia

Analyst: Malicious Virus SparkKitty Detected Stealing Wallet Mnemonics, Primarily Targeting Users in China and Southeast Asia

星球日报星球日报2025/06/24 07:51
Show original

Odaily Planet Daily reported that cybersecurity company Kaspersky has discovered a new type of malware called SparkKitty. This virus infects applications on iOS and Android devices to steal all images from users’ photo albums, aiming to find screenshots of crypto wallet mnemonic phrases. Kaspersky analysts noted that these malicious apps are mainly cryptocurrency-themed, including a crypto information tracking app called "币 coin" on the App Store and a messaging app with "cryptocurrency trading features" called SOEX on Google Play, which has been downloaded over 10,000 times. Researchers believe SparkKitty originates from the same source as the SparkCat malware discovered in January this year, as both share similar characteristics. The malware has been active since at least early 2024, primarily targeting users in Southeast Asia and China, though it is technically capable of attacking users in any region. Kaspersky has notified Google, and the related apps have been removed from app stores. (Cointelegraph)

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!