March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Kaspersky Discovers Malicious SDKs in Apps Targeting Crypto Wallets on Android and iOS

Kaspersky Discovers Malicious SDKs in Apps Targeting Crypto Wallets on Android and iOS



Kaspersky Discovers Malicious SDKs in Apps Targeting Crypto Wallets on Android and iOS

Kaspersky Lab has uncovered multiple applications on the Google Play Store and Apple App Store that are infected with a malicious SDK designed to steal mnemonic phrases or recovery keys from cryptocurrency wallets.

Hackers registered a domain similar to Alibaba Cloud’s official domain—aliyung[.]com—possibly as an intentional deception. If you are a cryptocurrency investor, it is highly recommended that you check the list of malicious apps to ensure you have not installed any of them. 

In a recently published analysis, Kaspersky detailed this malicious activity, marking the first time the company has detected iOS apps using OCR (Optical Character Recognition) to steal crypto wallet mnemonic phrases.

Kaspersky Discovers Malicious SDKs in Apps Targeting Crypto Wallets on Android and iOS


The “SparkCat” Attack Campaign

Kaspersky has named this attack campaign “SparkCat,” derived from the name of the malicious SDK—Spark. It is believed that many app developers unknowingly integrated this malicious SDK into their applications.

According to statistics, apps containing this malicious SDK have been downloaded over 242,000 times on Google Play alone. However, as Apple’s App Store does not publicly disclose download statistics, the number of affected iOS users remains unknown.

How the Attack Works

This attack primarily targets cryptocurrency investors. Once an infected app is installed, it uses OCR technology to detect and extract mnemonic phrases or recovery keys from crypto wallets. The stolen information is then transmitted to a hacker-controlled server, allowing attackers to regain access to victims’ wallets and drain their funds.

Among the infected apps, the most downloaded was ChatAi, which surpassed 50,000 downloads. Following Kaspersky’s report, Google has removed this app from the Play Store to prevent further damage.

Global Targeting with Multilingual Attacks

Through an in-depth analysis of the malicious SDK, Kaspersky discovered that the hackers are targeting users of Chinese, Japanese, Korean, and Latin scripts. While there is no concrete evidence that the attack is restricted to specific regions, the findings suggest a global-scale threat. Crypto users worldwide should remain vigilant against such threats.


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.