Both Android and iOS versions of SparkCat exploit the Google ML Kit library’s optical character recognition model to facilitate the exfiltration of crypto wallet recovery phrase-containing images to attackers’ command-and-control server via Rust, a report from Kaspersky revealed.
Novel crypto-targeting SparkCat malware campaign examined
