Malicious iOS, Android apps can read screenshots for passwords: Here's how

Reportedly, some malicious apps on App Store and Play Store have been using Optical Character Recognition (OCR) technology to extract crypto wallet passwords from saved screenshots

app store
Google Play Store and Apple App Store
Harsh Shivam New Delhi
2 min read Last Updated : Feb 06 2025 | 4:17 PM IST

Don't want to miss the best from Business Standard?

Several malicious apps on Android and iOS have been identified that can access saved screenshots to steal cryptocurrencies. According to a report by The Verge, citing cybersecurity firm Kaspersky, these apps utilise Optical Character Recognition (OCR) technology to extract text, including passwords, from images stored in the gallery. The report described this as the "first known case" of malicious apps using OCR that have been approved on Apple's App Store. 
What is OCR technology?
 
Optical Character Recognition (OCR) or Optical Character Reader is a technology that can recognise text within a digital image. It is commonly used to recognise text in scanned documents and images. It is also used in smartphones for allowing users to copy texts from an image.
 
How do these malicious apps attack?
 
Cybersecurity software firm Kaspersky discovered a particular malware called "SparkCat," late last year. Essentially, the malware triggers a request to access the device's photo gallery when a user attempts to initiate the chat support in an infected app. Once access is granted, the malware uses Google's OCR technology to extract text in photos, looking for sensitive data such as screenshots of crypto wallet passwords or recovery phrases. The extracted information is then sent to the attacker, who can exploit it to access the user's crypto wallets.
 
What apps are infected?
 
Kaspersky has identified two AI chat apps, WeTink and AnyGPT, that appear to have been specifically designed for the malware attack. Both apps remain available on the Apple App Store. Additionally, the firm has named a food delivery app, ComeCome, which has also been affected by the malware and is currently listed on both the App Store and Google Play Store.
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :App StoreGoogle Play StoreCyber fraudTechnology

First Published: Feb 06 2025 | 4:17 PM IST

Next Story