It might be the first time this type of stealer has cracked iPhones [engadget.com]:
Researchers from Kaspersky have identified malware being distributed within apps on both Android and iOS mobile storefronts. Dmitry Kalinin and Sergey Puzan shared their investigation [securelist.com] into a malware campaign, which they have dubbed SparkCat, that has likely been active since March 2024.
"We cannot confirm with certainty whether the infection was a result of a supply chain attack or deliberate action by the developers," the pair wrote. "Some of the apps, such as food delivery services, appeared to be legitimate, whereas others apparently had been built to lure victims." They said SparkCat is a stealthy operation that at a glance appears to be requesting normal or harmless permissions.
[...] The malware in question uses optical character recognition (OCR) to review a device's photo library, seeking screenshots of recovery phrases for crypto wallets. Based on their assessment, infected Google Play apps have been downloaded more than 242,000 times. Kaspersky says "This is the first known case of an app infected with OCR spyware being found in Appleās official app marketplace."
Originally spotted on Schneier on Security [schneier.com].