Identified by Kaspersky and reported by Bleeping Computer, SparkKitty malware gains access to photo galleries on iOS and Android, allowing it to exfiltrate images or data contained within them, possibly with the goal of stealing victims' crypto assets as well as other compromising information.
SparkKitty spreads through malicious apps that have been found (and subsequently removed) on the Apple App Store and Google Play Store. Kaspersky also discovered the malware in TikTok clones—distributed via unofficial platforms—that embed various fake apps, including cryptocurrency stores and gambling and casino apps.
What you need to do
iOS and Android users can take steps both to minimize or protect the sensitive data stored on their devices as well as limit the risk of falling victim to spyware like SparkKitty in the first place.
You should also exercise caution when downloading apps to your device, whether from the Google Play and Apple App stores or unofficial sources. Unfortunately, you can't trust everything you find even on vetted platforms. Look for red flags: Check the developer's history and scrutinize reviews, especially if there are a lot of glowing reviews relative to the number of downloads. Be wary of requests to access your photo gallery, especially if those permissions aren't related to the app's functionality. In fact, you should pay close attention to permissions requested any time you install a new app—don't just blindly allow them.
Finally, ensure Google Play Protect, which has live threat detection, is active on Android, and keep an eye out for warning signs of a malware infection on your device.
Read More Details
Finally We wish PressBee provided you with enough information of ( There's New Reason to Never Keep Screenshots of Private Information on Your Phone )
Also on site :