Reader Advisory

Some articles posted in The SlickMaster's Files may contain themes, languages, and content which may neither appropriate nor appealing to certain readers. READER DISCRETION is advised.
Showing posts with label trojan. Show all posts
Showing posts with label trojan. Show all posts

05 July 2025

Newsletter: Kaspersky has discovered SparkKitty: a new Trojan spy on App Store and Google Play

[THIS IS A PRESS RELEASE]


Kaspersky researchers have discovered a new Trojan spy called SparkKitty which targets smartphones on iOS and Android. It sends images from an infected phone and information about the device to the attackers. This malware was embedded in apps related to crypto and gambling, as well as in a trojanized TikTok app, and was distributed on App Store and Google Play, as well as on scam websites. Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines are also potentially at risk of facing a similar cyber threat. 

Kaspersky has notified Google and Apple about the malicious apps. Certain technical details suggest that the new malware campaign is linked to the previously discovered SparkCat Trojan — malware (the first of its kind on iOS) with a built-in optical character recognition (OCR) module that allows it to scan image galleries and steal screenshots containing cryptocurrency wallet recovery phrases or passwords. The SparkKitty case is the second time in a year that Kaspersky researchers have found a Trojan stealer on App Store, following SparkCat.

iOS

On App Store, the Trojan pretended to be an app related to cryptocurrencies — 币coin. On phishing pages mimicking the official iPhone App Store, the malware was distributed under the guise of TikTok and gambling applications.

An alleged crypto exchange app, 币coin, on App Store


A webpage mimicking AppStore to install an alleged TikTok app through developer tools


A fake web store embedded into the alleged TikTok app

"One of the vectors for the Trojan's distribution turned out to be fake websites where the attackers tried to infect the victims' iPhones. iOS has several legitimate ways to install programs not from the App Store. In this malicious campaign, the attackers used one of them — special developer tools for distributing corporate business applications. In the infected version of TikTok, during authorization, the malware, in addition to stealing photos from the smartphone gallery, embedded links to a suspicious store in the person's profile window. This store only accepts cryptocurrencies, which increases our concerns about it,” explains Sergey Puzan, a malware expert at Kaspersky.

Android

The attackers targeted users both on third-party websites and on Google Play, passing off the malware as various crypto services. For example, one of the infected applications — a messenger called SOEX with a cryptocurrency exchange function — was downloaded from the official store over 10,000 times. 

An alleged crypto exchange app, SOEX, on Google Play

Experts also found APK files of infected apps (these can be installed directly on Android smartphones bypassing official stores) on third-party websites that are likely related to the detected malicious campaign. They are positioned as investment crypto projects. The websites on which these applications were posted were advertised on social networks, including YouTube. 

"After the apps were installed, they functioned as promised in their description. But at the same time, photos from the smartphone gallery were sent to the attackers. The attackers may later try to find various confidential data in the images, for instance, crypto wallet recovery phrases to access the victims' assets. There are indirect signs that the attackers are interested in people's digital assets: many of the infected apps were related to crypto, and the trojanized TikTok app also had a built-in store that accepted payment for goods only in crypto," comments Dmitry Kalinin, a malware expert at Kaspersky. 

A detailed report about this attack is available on Securelist.com. 

To avoid becoming a victim of this malware, Kaspersky recommends the following safety measures:
  • If you have installed one of the infected applications, remove it from your device and do not use it until an update has been released to eliminate the malicious functionality
  • Avoid storing screenshots containing sensitive information in your gallery, including cryptocurrency wallet recovery phrases. Passwords, for example, could be stored in specialized applications such as Kaspersky Password Manager.
  • Reliable cybersecurity software, like Kaspersky Premium, can prevent malware infections. Due to the architectural features of the Apple operating system, the Kaspersky solution for iOS shows the user a warning if it detects an attempt to transfer data to the attacker's command server, and blocks the attacker from transferring data.
  • If an app asks for permission to access the phone's photo library, consider if this app really needs it. 
[END OF PRESS RELEASE]

06 October 2024

Newsletter: Kaspersky reports Necro Trojan sneaks into Google Play with up to 11 million victims

[THIS IS A PRESS RELEASE]

In late August 2024, Kaspersky experts identified a new version of the Necro Trojan that had infiltrated several popular applications on Google Play and modified applications on unofficial platforms, including Spotify, WhatsApp and Minecraft. Necro is an Android downloader that downloads and runs other malicious components on infected devices based on commands issued by the Trojan's creators. Kaspersky’s solutions recorded* Necro attacks targeting users in Russia, Brazil, Vietnam, Ecuador, and Mexico as part of this malicious campaign.

28 March 2024

Newsletter: Kaspersky supports INTERPOL-coordinated action to disrupt Grandoreiro malware operation

[THIS IS A PRESS RELEASE]


Kaspersky has assisted an INTERPOL-coordinated action, which has led to Brazilian authorities arresting five administrators behind a Grandoreiro banking trojan operation. According to conservative estimates, the banking trojan operators are believed to have defrauded victims of more than 3.5 million euros (more than PHP 214 million).

01 September 2022

Newsletter: Kaspersky unmasks active malicious campaigns targeting Android and iOS users in APAC

[THIS IS A PRESS RELEASE]

Global cybersecurity company shares how to secure smartphones from “Anubis” mobile Trojan and the infamous “Roaming Mantis” campaign

Suguru Ishimaru, Senior Malware Researcher for Global Research and Analysis Team (GReAT) at Kaspersky

01 September 2022

With the continued uptick in the adoption of mobile banking in Asia Pacific (APAC), global cybersecurity company Kaspersky warns of more attacks against Android and iOS devices. Particularly, active monitoring shows the notorious Anubis Trojan now delivers a combination of mobile banking Trojan with ransomware functionalities to its target smartphones.

04 November 2021

Kaspersky expert says 2019 witnessed the start of banking Trojan outbreak in APAC

10/23/2021 5:03:00PM


Kaspersky has discovered that a banking-related Trojan outbreak has almost coincided with the start of the on-going novel Coronavirus pandemic, a sudden health plague that totally-changed the landscape of the world today. 

03 January 2021

Kaspersky detects at least 360K new malicious files per day in 2020

12/22/2020 12:22:08 AM


Did you know that Kaspersky has detected over 360,000 new malicious files per day in 2020? Yes, it's a 5.2 percent increase compared to 2019.

20 December 2020

More cyberattacks may take place in 2021, says Kaspersky

11/24/2020 11:29:15 PM


There may be worse things to come in terms of cybersecurity matters as Kaspersky has shared in one of their recent press release articles how the landscape of target attacks may take place come 2021.

16 December 2020

Double Trouble? Banking malware comes with another trojan

11/22/2020 02:31:02 PM


There's a new banking malware on the loose as Kaspersky researchers recently detected URL addresses that not distribute a malicious .ZIP file for Windows, but also a malicious file that appeared to be a downloader to install a new banking Trojan.

16 November 2019

More cyberattacks on PH during Jan-Sept '19

11/12/2019 01:39:52 AM

The Philippines has been one of the hottest target countries when it comes to cyberattacks. In the regional scale, however, this news can even be scarier as Kaspersky said the country placed third among Southeast Asian countries with the highest Android mobile malware attempts detected and blocked by the cybersecurity company.