Malware that includes code for reading the contents of screenshots has been found in suspicious App Store apps for the first time.
The malware, known as SparkCat, utilizes OCR capabilities to extract sensitive information captured in screenshots, particularly targeting recovery phrases for cryptocurrency wallets.
The infected apps in the App Store use an OCR plug-in to recognize text within images, which is then sent to a server for the attacker to access.
Kaspersky recommends users to avoid storing screenshots with sensitive information in their Photo Library to protect against this malware.