Home » Business » IOS App Store Hit by First-Ever Screenshot-Reading Malware

IOS App Store Hit by First-Ever Screenshot-Reading Malware

here ‍is the content ⁣you requested:

Current…request to‌ access users’ photo galleries when they attempt‌ to use chat support within the infected app. ‌Once permission is granted, it uses ⁣Google OCR tech, which lets it decipher text ⁢found in photos, to look for things like screenshots of crypto wallet passwords or recovery phrases. The software then sends‍ any images‌ it finds back to the attackers,who can then use the info to access the wallets and steal crypto.

Kaspersky says it can’t “confirm with certainty the infection was a result of a supply chain attack ⁤or deliberate action by‌ the ‍developers.” the company ⁢names two AI chat apps that seem‌ to have been created for the campaign and appear to still be available on the App Store, called WeTink and ‌ AnyGPT. Additionally, Kaspersky found the malicious code in a legitimate-seeming food ⁣delivery app called ComeCome, which you can also still download.

Neither Apple nor Google​ immediately responded to The Verge’s ⁣request for comment.

Malicious Apps Exploiting google OCR to‍ Steal Crypto: An Interview‍ with Cybersecurity Expert Dr. qat

In a recent finding⁣ by Kaspersky, several mobile applications, including AI chat apps and a food delivery app, have been found to exploit Google OCR technology⁣ to steal crypto‍ wallet credentials.Senior‍ Editor of world-today-news.com, [Editor Name], ‍sat down with cybersecurity specialist Dr.qat to dive deeper ⁣into ​this alarming trend and the steps users can take to protect themselves.

Q&A‌ Session with ​dr. qat

Editor: Can you ⁢start by summarizing‌ how these malicious apps are exploiting Google ‍OCR technology?

Dr. qat: These malicious apps request permission to access⁣ a user’s photo gallery, often under the guise of needing to use chat support. Once access is granted,​ the app uses Google OCR technology to scan and decipher text found within the photos. This ⁣process specifically targets images that may contain sensitive data like screenshots of crypto wallet passwords or recovery phrases, which are then sent back to the attackers.

Editor: What makes⁤ this kind of ‌attack‍ particularly insidious ​and effective?

Dr. qat: The appeal of this ⁢attack method lies in its ability to discreetly and efficiently extract highly sensitive information without the‍ userS awareness.‌ The integration of Google OCR technology lends an​ air of legitimacy, and users are often more likely to grant permission for what seems like a routine app function. Moreover, conventional security measures typically don’t flag this kind of non-intrusive data extraction activity.

Editor: Which specific apps have been identified as being compromised?

Dr. qat: Kaspersky identified⁣ two AI chat apps on the App Store — WeTink and AnyGPT — as well as a ⁢food delivery app called comecome. These apps appear to have been tailored for stealing sensitive information, ‍demonstrating a targeted campaign aimed at stealing crypto assets.

Editor: How can users protect themselves from falling​ victim to such attacks?

Dr. ⁤qat: Users should‌ be‍ extremely cautious about granting ‌permissions ⁤to apps, especially permissions‌ that seem unneeded or excessive for the app’s ‌core function. Regularly​ review app permissions and consider using security tools that monitor unusual or potentially harmful activities. Additionally, ‌educating oneself on the​ latest threats and adopting strong data protection measures, like using a VPN and maintaining robust password management practices,‍ can significantly reduce risk.

Editor: What steps ⁤can ‍be taken to ensure that these malicious apps are removed from app stores?

Dr. qat: Users should report any suspected⁤ malicious activities to the respective⁤ app​ stores and cybersecurity organizations. ⁢This collective reporting can help in quickly identifying and removing compromised apps. Companies like Kaspersky and other cybersecurity firms play a crucial role in identifying and reporting such threats. Lastly, users should rely on well-established reputable app stores and thoroughly research new apps before installing them.

Editor: Do you believe there’s a‍ need for stricter regulations or oversight by the tech ​giants like Apple and Google?

Dr. qat: Certainly. Stricter regulations and oversight are vital to prevent such attacks. Tech giants like ⁤Apple and Google must adopt⁣ more rigorous vetting processes for apps and‌ continuously monitor for suspicious⁢ activities post-deployment. Enhanced transparency and better user ‍education on security best practices will also help mitigate these risks.

Concluding Thoughts

Editor: Dr. qat’s insights ⁢reveal a sophisticated and worrying trend where user privacy is being steadily eroded by sophisticated malicious software. With cybercriminals employing advanced technologies like Google OCR, it is crucial now more ‍than ever to stay ‌vigilant and proactive ⁤in safeguarding our digital assets.

Dr. qat: Thank you for the opportunity to ‌discuss this vital issue.User⁤ awareness, proactive cybersecurity measures, and regulatory‌ oversight by tech giants are our best defenses in this evolving landscape. Together, we can work to​ make⁣ the digital space a safer place.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.