here is the content you requested:
—
Current…request to access users’ photo galleries when they attempt to use chat support within the infected app. Once permission is granted, it uses Google OCR tech, which lets it decipher text found in photos, to look for things like screenshots of crypto wallet passwords or recovery phrases. The software then sends any images it finds back to the attackers,who can then use the info to access the wallets and steal crypto.
Kaspersky says it can’t “confirm with certainty the infection was a result of a supply chain attack or deliberate action by the developers.” the company names two AI chat apps that seem to have been created for the campaign and appear to still be available on the App Store, called WeTink and AnyGPT. Additionally, Kaspersky found the malicious code in a legitimate-seeming food delivery app called ComeCome, which you can also still download.
Neither Apple nor Google immediately responded to The Verge’s request for comment.
Malicious Apps Exploiting google OCR to Steal Crypto: An Interview with Cybersecurity Expert Dr. qat
In a recent finding by Kaspersky, several mobile applications, including AI chat apps and a food delivery app, have been found to exploit Google OCR technology to steal crypto wallet credentials.Senior Editor of world-today-news.com, [Editor Name], sat down with cybersecurity specialist Dr.qat to dive deeper into this alarming trend and the steps users can take to protect themselves.
Q&A Session with dr. qat
Editor: Can you start by summarizing how these malicious apps are exploiting Google OCR technology?
Dr. qat: These malicious apps request permission to access a user’s photo gallery, often under the guise of needing to use chat support. Once access is granted, the app uses Google OCR technology to scan and decipher text found within the photos. This process specifically targets images that may contain sensitive data like screenshots of crypto wallet passwords or recovery phrases, which are then sent back to the attackers.
Editor: What makes this kind of attack particularly insidious and effective?
Dr. qat: The appeal of this attack method lies in its ability to discreetly and efficiently extract highly sensitive information without the userS awareness. The integration of Google OCR technology lends an air of legitimacy, and users are often more likely to grant permission for what seems like a routine app function. Moreover, conventional security measures typically don’t flag this kind of non-intrusive data extraction activity.
Editor: Which specific apps have been identified as being compromised?
Dr. qat: Kaspersky identified two AI chat apps on the App Store — WeTink and AnyGPT — as well as a food delivery app called comecome. These apps appear to have been tailored for stealing sensitive information, demonstrating a targeted campaign aimed at stealing crypto assets.
Editor: How can users protect themselves from falling victim to such attacks?
Dr. qat: Users should be extremely cautious about granting permissions to apps, especially permissions that seem unneeded or excessive for the app’s core function. Regularly review app permissions and consider using security tools that monitor unusual or potentially harmful activities. Additionally, educating oneself on the latest threats and adopting strong data protection measures, like using a VPN and maintaining robust password management practices, can significantly reduce risk.
Editor: What steps can be taken to ensure that these malicious apps are removed from app stores?
Dr. qat: Users should report any suspected malicious activities to the respective app stores and cybersecurity organizations. This collective reporting can help in quickly identifying and removing compromised apps. Companies like Kaspersky and other cybersecurity firms play a crucial role in identifying and reporting such threats. Lastly, users should rely on well-established reputable app stores and thoroughly research new apps before installing them.
Editor: Do you believe there’s a need for stricter regulations or oversight by the tech giants like Apple and Google?
Dr. qat: Certainly. Stricter regulations and oversight are vital to prevent such attacks. Tech giants like Apple and Google must adopt more rigorous vetting processes for apps and continuously monitor for suspicious activities post-deployment. Enhanced transparency and better user education on security best practices will also help mitigate these risks.
Concluding Thoughts
Editor: Dr. qat’s insights reveal a sophisticated and worrying trend where user privacy is being steadily eroded by sophisticated malicious software. With cybercriminals employing advanced technologies like Google OCR, it is crucial now more than ever to stay vigilant and proactive in safeguarding our digital assets.
Dr. qat: Thank you for the opportunity to discuss this vital issue.User awareness, proactive cybersecurity measures, and regulatory oversight by tech giants are our best defenses in this evolving landscape. Together, we can work to make the digital space a safer place.
Related