home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 370 of 2,445   
   Mike Powell to All   
   Screen reading malware fo   
   07 Feb 25 11:02:00   
   
   TZUTC: -0500   
   MSGID: 75.consprcy@1:2320/105 2c0b67d6   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Screen reading malware found in iOS app stores for first time - and it might   
   steal your cryptocurrency   
      
   Date:   
   Thu, 06 Feb 2025 20:49:00 +0000   
      
   Description:   
   SparkCat malware is targeting unsuspecting iOS and Android app stores.   
      
   FULL STORY   
      
   Crypto-stealing malware dubbed SparkCat has been discovered on iOS and    
   Android app stores, and is embedded with a malicious SDK/framework for   
   stealing recovery phrases for crypto wallets.    
      
   A report from Kaspersky has identified malicious apps, some with upwards of   
   10,000 downloads, that scan the victims gallery to find keywords - if    
   relevant images are found, they are then sent to a C2 server.    
      
   This is the first time a stealer has been found in Apples App store, and this   
   is significant because Apple reviews every entry to help provide a safe and   
   trusted experience for users - so these malware-infected apps show that the   
   review process is not as robust as it should be.    
      
   Although aimed at stealing cryptocurrency wallet recovery phrases, Kaspersky   
   notes that the malware is flexible enough to steal other sensitive data from   
   victims galleries - heres what we know. Multiple malicious apps    
      
   The SparkCat malware campaign was first discovered in late 2024, and is   
   suspected to have been active since March 2024.    
      
   The first app Kaspersky identified was a Chinese food delivery app, ComeCome.   
   The app had over 10,000 downloads and was based in Indonesia and the UAE. The   
   app was embedded with malicious content, and contained OCR spyware which    
   chose images from the infected devices to exfiltrate and send to the C2   
   server.    
      
   This wasnt the only infected app though, and researchers found that infected   
   apps available in Google Play had been downloaded a combined total of over   
   242,000 times. In 2024, over 2 million risky Android apps were blocked from   
   the Play Store , including some which tried to push malware and spyware - so   
   although Google is improving its protections, clearly some still make it   
   through.    
      
   In the app store, some apps appeared to be legitimate, like the food delivery   
   services, while others had apparently been built to lure victims. An example   
   of this, researchers outlined, is a series of similar AI-featured messaging   
   apps by the same developer,  including AnyGPT and WeTink.    
      
   Its not clear whether these infections are deliberate actions by developers,   
   or are a result of supply chain attacks, but the report does note that the   
   permissions that it requests may look like they are needed for its core   
   functionality or appear harmless at first glance.    
      
   What makes this Trojan particularly dangerous is that theres no indication of   
   a malicious implant hidden within the app  Kaspersky adds.   
      
   Mitigating malware    
      
   If you have one of the infected apps installed on your device, Kaspersky of   
   course recommends removing it and steering clear until a fix is released -    
   the list of infected apps can be found here .    
      
   There is software that can help protect your device, like antivirus software    
   - and as a key part of this malware in particular is the exfiltration of   
   sensitive data through screenshots, the best advice is to avoid storing   
   passwords, confidential documents, or sensitive information in your gallery.    
      
   Instead, check out the best password managers to securely store your   
   information, as these present a much safer and convenient option to keeping   
   your passwords in your photos. Make sure you dont reuse passwords on multiple   
   sites, and change your passwords regularly to avoid a breach.    
      
   There are some tricks to avoid malware apps, and considering that dangerous   
   malware apps have been found to have been installed millions of times , its   
   always best to be safe.    
      
   First of all, be wary of the warning signs. Go through the feedback and   
   reviews - especially the negatives, as it's likely someone else will have   
   already flagged a bug. Be very suspicious of an app which asks for your   
   existing social media credentials - as this could be criminals looking to   
   hijack your account.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/screen-reading-malware-found-in-ios-app   
   -stores-for-first-time-and-it-might-steal-your-cryptocurrency   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca