Set as Homepage - Add to Favorites

精品东京热,精品动漫无码,精品动漫一区,精品动漫一区二区,精品动漫一区二区三区,精品二三四区,精品福利导航,精品福利導航。

【asian caught stealing sex videos】New malware scans photos on both Android and iOS devices

Cybersecurity researchers at Kaspersky have asian caught stealing sex videosuncovered a new and dangerous malware strain, which they believe has been active since at least Feb. 2024.

Dubbed SparkKitty, the malware is part of the broader SparkCat family — a line of Trojan horse programs designed to steal cryptocurrency from unsuspecting users. Kaspersky first discovered the original SparkCat malware in Jan. 2025, noting that it had already made its way onto both the Google Play Store and Apple’s App Store.

SEE ALSO: Scammers tricked TikTok users into downloading malware with AI videos

Like many trojans, these malicious apps disguise themselves as legitimate software. In the crypto world, this can be especially risky. The researchers say that one such Android app, SOEX, posed as a messaging platform with cryptocurrency trading features. They say it racked up more than 10,000 downloads on Google Play before being flagged. Kaspersky researchers found a similar app on the iOS app store, as well as modified versions of the TikTok app posing as the real thing.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

You May Also Like

SparkKitty is specifically engineered to access users’ photo libraries. The reasoning being that many crypto users screenshot their recovery phrases — which are needed to restore access to their wallets — and store them in their camera rolls. By extracting these images, attackers can potentially gain full access to victims’ crypto accounts.

Malware like SparkKitty is built to scan for images that could be valuable to attackers. However, unlike its more targeted predecessor, SparkCat, SparkKitty isn’t especially selective — it scoops up a broad range of images and sends them back to the attackers, regardless of content, according to a detailed report on Secure List by Kapersky.


Related Stories
  • Beware of AI tools being advertised on Facebook. They could be malware in disguise.
  • Hackers leak 86 million AT&T customer records with 44 million social security numbers, report says
  • Coinbase confirms data breach with hackers demanding $20 million ransom

While the primary concern remains the theft of crypto wallet recovery phrases, broader access to users’ photo libraries opens the door to other risks, including potential extortion using sensitive or private images. That said, there appears to be no evidence that the stolen images have been used for blackmail or similar schemes.

Kaspersky reports that the malware campaign has primarily targeted users in Southeast Asia and China. Most of the infected apps were disguised as Chinese gambling games, TikTok clones, and adult entertainment apps, all tailored to users in those regions.

Topics Cybersecurity

0.1468s , 12300.65625 kb

Copyright © 2025 Powered by 【asian caught stealing sex videos】New malware scans photos on both Android and iOS devices,Info Circulation  

Sitemap

Top 主站蜘蛛池模板: 一本道本月无码 | 日韩大片免费观看视频播放 | 在线va无卡无码高清 | 高潮爽到爆好爽无码喷水视频 | 亚洲阿v天堂无码在线 | 玖玖香蕉视频 | 55夜色66成年视频观看免费 | 日本在线播放一区 | 青青草国产成人久久91网 | 国产在线精品一区二区三区不 | 午夜三级a三级三点在线观看 | 日本亚洲欧洲色情 | 人妻精油按摩bd高清中文字幕 | AV无码偷拍在线观看 | 久久久久免费一级毛片韩片 | 成人在线观看免费视频 | 女同hd系列中文字幕 | 天堂av无码大芭蕉伊人 | 亚 久在线观看影音先锋黄色视频 | 国产成人av无码精品 | 无码av蜜臀aⅴ色欲在线观看 | 亚洲日本天堂一区二区三区 | 亚洲国产午夜精品理论片妓女 | 精品一区二区三区在线观看视频 | 国产精品亚洲综合专区片高清久久久 | AV午夜久久蜜桃传媒软件 | av潮喷大喷水系列无码 | 第一区二区快射影院 | 久久综合九色综合 | 9a1v精品少妇一区二区三区 | 亚洲av无码一区二区二三区 | 国产人妻午夜在线无码 | 国产成人av无码永久免费 | 四虎影院永久网站 | 国产91无码精品秘久久久 | 熟女视频人妻欧美国产精品麻豆成人av电影 | 久久精品亚洲精品无码白云tv | 日韩精品一区二区三区精品 | 国产精品无码专区第一页 | 亚洲熟妇自偷自拍另类图片站 | 国产成人亚洲综合91精亚洲精品 |