Crypto Hackers Can Now Steal Password From Your Camera Roll
News By Alex Dovbnya Fri, 3/04/2026 - 15:16 Cybersecurity researchers have uncovered a sophisticated new strain of the "SparkCat" Trojan malware that can steal crypto from your smartphone's camera roll. Advertisement
Advertisement
Cybersecurity researchers have uncovered a highly sophisticated method hackers are using to drain cryptocurrency wallets. This method targets a vulnerability most people do not even think about: the photo gallery on your smartphone.
A new evolving strain of malware known as SparkCat has bypassed security reviews on both the Apple App Store and the Google Play Store.
SparkCat, explained
SparkCat is a Trojan malware that was originally discovered in February 2025. The threat actors have released a heavily disguised version of the virus.
HOT Stories Hyperliquid Whale Sells Five Million XRP in 20x Short Deal, Japanese Bitcoin Researchers See $10,000 BTC as Worst-Case Scenario, Ethereum Foundation Stakes Nearly $100 Million in Ether: Morning Crypto Report Shiba Inu's (SHIB) Last Chance, Will XRP Hit $2 Again? Bitcoin (BTC) Bull Run Denied, Could $60,000 Be Next? Crypto Market ReviewSparkCat is meant to find and steal a user's crypto wallet recovery phrase that makes it possible to drain all the funds.
Advertisement You Might Also Like
Thu, 04/02/2026 - 11:24
Ledger CTO Urges Community to Increase Crypto Security After Recent Solana Dex Hack
ByYuri Molchan
The malware does not look like a virus. Instead, the developers hide the malicious code inside seemingly harmless applications.
The researchers identified and removed two infected apps from the iOS App Store and one from the Google Play Store. The malware is also distributed via third-party websites.
AdvertisementThe malware executes a highly effective attack that involves requesting permissions, performing silent scanning, and reading the images with the help of an optical character recognition (OCR) module.
If the OCR technology detects specific keywords, it immediately sends that specific image to the attacker's remote server.
How to protect yourself?
Treating your camera roll like a notepad is obviously not a good idea. One should avoid taking or storing screenshots of sensitive information (especially cryptocurrency wallet recovery phrases).
If you must keep digital copies of important documents or passwords, store them in an encrypted application.
One should always exercise extreme caution when granting photo or file permissions to new apps.
Advertisement