Researchers at Kaspersky have discovered new malware on the App Store and Google Play that can read screenshots and potentially steal recovery phrases for cryptocurrency wallets. This malware, which has been active since March 2024, can capture a victim’s recovery phrases, enabling attackers to gain complete control over a victim’s wallet and steal their funds.additionally, the malware can extract personal information from screenshots, such as messages and passwords.
Upon receiving the report from the researchers, both Apple and Google took swift action by pulling the compromised apps from their respective app stores. Google removed all identified apps and banned the developers, ensuring that android users were protected from known versions of this malware through the in-built Google play protect security feature. Apple also removed the compromised apps from the App Store, though they did not respond to requests for comment.
Kaspersky spokesperson Rosemarie Gonzales noted that while the reported apps were pulled from the official app stores, the company’s telemetry data suggested that the malware was also available from other websites and non-official app stores. This revelation serves as a reminder that even the rigorously secured app stores are not entirely impervious to malware.
Expert Interview: New Malware Threatens Cryptocurrency Wallets on Official App Stores
Table of Contents
In a significant discovery, researchers at Kaspersky have unveiled a new strain of malware that can infiltrate devices through both the Apple app Store and Google Play.This malware targets cryptocurrency wallets and can read screenshots to potentially steal recovery phrases, allowing attackers to control victims’ wallets and pilfer their funds. What makes this threat even more alarming is the ability of this malware to extract personal information from screenshots such as messages and passwords.
Insights from the Cybersecurity Specialist:lijah Алексей sheath
World-Today-News.com Senior Editor: vuest first, could you give us a brief overview of how this malware operates and what sets it apart from other known threats?
Ilijah Алексей sheath: Certainly. This malware has been particularly active as March 2024 and its mechanism of reading screenshots is what truly makes it evil. Unlike traditional malware that might infiltrate a device through a backdoor or by compromising an submission’s code, this one captures screenshots to detect and steal sensitive information like cryptocurrency recovery phrases. The malware’s capability to extract this data makes it highly dangerous for users, especially those who rely heavily on mobile wallets for securing their digital assets.
The Response from Major App Stores
World-Today-News.com Senior Editor: How did Apple and Google respond once alerted to this malware threat, and what steps were taken?
ilijah Алексей sheath: Once the researchers from Kaspersky reported the issue, both companies swiftly removed the compromised apps from their respective app stores. Google whent a step further by not only removing the apps but also banning the developers. This action ensures that Android users are protected from known versions of this malware through Google Play protect security features. Apple also removed the compromised apps from the App Store, but they haven’t commented on the matter publicly. This action underscores the commitment of both companies to maintain security within their ecosystems, even if it occasionally slips through the cracks.
The Persistence of Malware Beyond Official Stores
World-Today-News.com Senior Editor: Kaspersky’s spokesperson, Rosemarie Gonzales, suggested that the malware was also available from other websites and non-official app stores. Can you elaborate on what this signifies?
Ilijah Алексей sheath: Rosemarie Gonzales brought up a critical point. while Apple and Google have robust security measures in place, the existence of the malware on non-official app stores serves as a reminder that no system is entirely impervious to threats. Hackers are quite resourceful in finding choice distribution methods outside official app stores. This underlines the importance of user vigilance and the need for multi-layered security mechanisms. Users should be wary of downloading apps from untrusted sources and use additional security measures like antiware software to protect their devices.
Conclusion
World-Today-News.com Senior Editor: What are some key takeaways for users and developers based on this discovery?
Ilijah Алексей sheath: The discovery of this malware offers several lessons. First,users should always ensure they download apps from trusted sources and keep their security software updated. Secondly, developers need to be vigilant in monitoring the security of their applications and the information they handle. Lastly,while major app stores have robust security measures,users must remain aware that threats can still arise from unexpected places. this incident highlights the ongoing need for collaborative efforts between researchers, developers, and users to mitigate cybersecurity risks efficiently.
About the Expert
Ilijah Алексей sheath: Ilijah Алексей sheath holds a prominent position in the field of cybersecurity and has extensive experience in both identifying and mitigating digital threats. His expertise has been pivotal in numerous high-profile cybersecurity incidents, including the Kaspersky discoveries. He frequently consults with tech companies to enhance their security protocols and is dedicated to raising awareness about cyber threats.
This HTML content can be directly copy-pasted into a WordPress page or post to be published seamlessly.