Kaspersky has uncovered a major malware campaign called SparkCat , which secretly scanned phone galleries for crypto recovery phrases hidden in screenshots. The malware was embedded in food delivery and AI chat apps , infecting nearly 242,000 users before being removed from app stores. Unlike typical scams that lure victims with financial promises, SparkCat operated in secrecy , making its true financial impact difficult to measure. Kaspersky, a well-known cybersecurity firm, reported that the malware had been active on Google Play and the App Store since March 2024 . It used machine learning to scan images for sensitive information, including crypto wallet recovery phrases and passwords. According to the report, the malware was hidden inside seemingly harmless apps, such as food delivery services and AI chatbots, allowing attackers to access users’ photo galleries. The goal was to extract private recovery keys without raising suspicion. Kaspersky has not confirmed how much money or cryptocurrency was stolen but emphasized that this was a highly sophisticated attack . The operation mainly targeted users in Europe and Asia , and the language found in the malware’s source code led researchers to conclude that the perpetrators were of Chinese origin . The affected apps have since been taken down, but this discovery is significant because crypto-related malware attacks had been declining. In contrast, social media scams involving meme coins have become more common, using aggressive tactics to manipulate investors . SparkCat’s approach was notably different, focusing on stealth rather than deception. Its ability to bypass multiple security protocols raises concerns about whether similar attacks could emerge in the future. At this stage, it remains unclear if SparkCat represents a new trend in crypto theft. Unlike traditional scams that exploit greed through fake projects, this malware relied on its victims' carelessness, silently extracting valuable data without requiring any direct engagement.