Igniting a DNS Spark to Investigate the Inner Workings of SparkCat
A recent investigation led to the discovery of Android and iOS apps laced with a malicious software development kit (SDK) dubbed “SparkCat.” As a result, the apps stole victims’ crypto wallet recovery phrases. Based on the malware time stamps and configuration file creation dates found in GitLab repositories, SparkCat has been seemingly active since March 2024.
SecureList published five indicators of compromise (IoCs) related to SparkCat.1 WhoisXML API dove deep into the threat’s DNS footprints and uncovered other artifacts comprising: