The discovery of SparkCat’s presence in a widely used food delivery app underscores the malware’s reach and the potential impact on unsuspecting users. Notably, Apple has not responded to ...
In a new development, researchers at Kaspersky have discovered SparkCat malware in iOS in suspicious App Store apps that can read screenshot contents. The researchers identified a new iOS malware ...
SparkCat is distributed through official app stores and requests permission to access images under the guise of seemingly legitimate functions, such as attaching images in support chats.
Security researchers at Kaspersky said the malware, dubbed SparkCat, has been active since March 2024. Initially, the researchers found the malicious framework within a food delivery app used in ...
Yes, malware has started to make its way from Android to the iPhone. Dubbed SparkCat, this is a kind of malware framework that runs in the background, running OCR on all your photos in hopes of ...
Security researchers at Kaspersky described the malware, SparkCat, as a data-stealing Trojan found to be active in Apple's AppStore and Google Play. They believe it has been floating around the ...
It was recently reported that the “SparkCat” malware is stealing sensitive information in Malaysia through Optical Character Recognition (OCR) technology. Is this true? CSM, said in a ...
The malware, dubbed SparkCat, hides in various inconspicuous-looking apps that are distributed via the official manufacturer stores Google Play and App Store, as security firm Kaspersky reports.