Researchers have identified a new iteration of the SparkCat malware actively distributed via the Apple App Store and Google Play Store. This mobile Trojan, initially detected over a year ago, targets both iOS and Android platforms by embedding itself within legitimate-appearing applications, including enterprise messaging tools and food delivery services.

The SparkCat malware family employs advanced persistence mechanisms to maintain foothold on infected devices. On Android, it leverages device administrator privileges to resist uninstallation, while on iOS, it exploits enterprise provisioning profiles to bypass App Store restrictions. The malware establishes covert communication channels with command-and-control (C2) servers to receive instructions and exfiltrate sensitive data.

Data exfiltration capabilities include the collection of device identifiers, contact lists, message logs, and geolocation data. SparkCat uses encrypted HTTPS traffic to communicate with C2 infrastructure, complicating detection efforts. The malware also executes remote commands to download and install additional payloads, enabling modular expansion of functionality.

Affected platforms include iOS versions 12 through 15 and Android versions 8 through 11. The malware's presence on official app marketplaces is attributed to sophisticated social engineering tactics and exploitation of app vetting process weaknesses.

Detection signatures for SparkCat involve monitoring unusual app behavior such as unauthorized access to device administrator APIs on Android and anomalous network traffic patterns consistent with encrypted C2 communication. Security vendors like Lookout and Trend Micro have released updated detection rules targeting SparkCat variants. Endpoint protection solutions should incorporate heuristics to identify apps requesting excessive permissions unrelated to their advertised functionality.

Removal guidance includes revoking device administrator privileges on Android devices before uninstalling the malicious app. For iOS, users must remove the enterprise provisioning profile associated with the malware in the device settings. Performing a full device reset is recommended if persistence mechanisms prevent standard removal. Organizations should audit enterprise app deployment policies to prevent sideloading of unauthorized apps.

Vulnerabilities exploited by SparkCat have been linked to CVE-2021-1782 and CVE-2021-30858, which involve privilege escalation and app sandbox escape on Android and iOS respectively. The malware has been attributed to the threat actor group APT28, known for targeting high-value mobile users.

SOC analysts should integrate SparkCat indicators of compromise (IOCs) into SIEM platforms and monitor unusual app installation patterns. Continuous updates from mobile security vendors are critical to mitigate evolving SparkCat threats on mobile ecosystems.

Related: