{"id":54813,"date":"2025-02-07T08:33:40","date_gmt":"2025-02-07T08:33:40","guid":{"rendered":"https:\/\/bocau.com.vn\/?p=54813"},"modified":"2025-02-10T01:17:00","modified_gmt":"2025-02-10T01:17:00","slug":"ma-doc-doc-anh-chup-man-hinh-iphone-lan-dau-xuat-hien","status":"publish","type":"post","link":"https:\/\/bocau.com.vn\/en\/ma-doc-doc-anh-chup-man-hinh-iphone-lan-dau-xuat-hien\/","title":{"rendered":"Malicious code reader screenshot iPhone first appearance"},"content":{"rendered":"<p>Malicious code SparkCat is discovered inside a number of apps on the App Store, there is the ability to collect content from a screenshot of the iPhone users.<\/p>\n\n\n\n<p>According to the security researcher at Kaspersky, malware SparkCat exist in the application which had passed the security check of the Apple to appear on store App Store. The infected application SparkCat was discovered ComeCome, WeTink and AnyGPT. This is also the first such threat is found in the App Store.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/i1-sohoa.vnecdn.net\/2025\/02\/06\/Crypto-stealing-malware-SparkC-2654-4560-1738856739.png?w=680&amp;h=0&amp;q=100&amp;dpr=1&amp;fit=crop&amp;s=B3OijrOu47SAnbrAmfQQwQ\" alt=\"Minh h\u1ecda v\u1ec1 m\u00e3 \u0111\u1ed9c \u0111\u00e1nh c\u1eafp v\u00ed ti\u1ec1n s\u1ed1 tr\u00ean Apple App Store. \u1ea2nh: ReadWrite\"\/><figcaption class=\"wp-element-caption\">Illustration malicious code stolen wallet number on the App Store. Photo:&nbsp;<em>ReadWrite<\/em><\/figcaption><\/figure>\n\n\n\n<p>Analysis of Kaspersky shows app series infected SparkCat use the Recognition optical character (OCR) to scan the screenshot with the purpose of finding sensitive information. Inside they contain malicious modules, take advantage of the plug-in add ML Kit OCR by Google to analyse the image and get content on it.<\/p>\n\n\n\n<p>SparkCat special focus on the phrase \u201cseed\u201d used to restore the wallet number, thereby allowing the attacker to steal Bitcoin and digital assets, other. Experts said that if the detection screen shots related to wallet number, the malicious code will immediately transmit the data collected to a server of the attacker.<\/p>\n\n\n\n<p>SparkCat is said to have been active from January 3\/2024, but mainly on your Android device before appeared on devices running the iOS recently. Besides collecting content from the screenshot, when installed, the application infected SparkCat will require access to photos and scans to take other important content.<\/p>\n\n\n\n<p>Kaspersky said a number of apps infected SparkCat still exist on the App Store. They are not yet able to determine this is intentional from the developer or due to them being attacked.<\/p>\n\n\n\n<p>Apple has not given comment.<\/p>\n\n\n\n<p>Kaspersky recommends that users should not save screenshot contains important content, as the phrase to restore the wallet, electronic banking password... in the photo gallery. Instead, they should use a password manager, or stored in a safer place.<\/p>\n\n\n\n<p>Follow&nbsp;<em>GizChina<\/em>historically, iOS is now one of the secure operating system on mobile devices. Hackers also tend to attack devices running Android more. However, recently things are slowly changing as attackers are using the way more advanced to penetrate into the Apple platform.<\/p>\n\n\n\n<p>Source: <em>vnexpress.net<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>M\u00e3 \u0111\u1ed9c SparkCat \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n b\u00ean trong m\u1ed9t s\u1ed1 \u1ee9ng d\u1ee5ng tr\u00ean App Store, c\u00f3 kh\u1ea3 n\u0103ng thu th\u1eadp n\u1ed9i dung t\u1eeb \u1ea3nh ch\u1ee5p m\u00e0n h\u00ecnh c\u1ee7a ng\u01b0\u1eddi d\u00f9ng iPhone. Theo c\u00e1c nh\u00e0 nghi\u00ean c\u1ee9u b\u1ea3o m\u1eadt t\u1ea1i Kaspersky, ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i SparkCat t\u1ed3n t\u1ea1i trong c\u00e1c \u1ee9ng d\u1ee5ng v\u1ed1n \u0111\u00e3 v\u01b0\u1ee3t qua [&#8230;]\n","protected":false},"author":2,"featured_media":54814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-54813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tin-tuc"],"_links":{"self":[{"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/posts\/54813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/comments?post=54813"}],"version-history":[{"count":1,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/posts\/54813\/revisions"}],"predecessor-version":[{"id":54815,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/posts\/54813\/revisions\/54815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/media\/54814"}],"wp:attachment":[{"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/media?parent=54813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/categories?post=54813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bocau.com.vn\/en\/wp-json\/wp\/v2\/tags?post=54813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}