Event JSON
{
"id": "700cc59727e722e1f0a2d5a358f10841392ad965f1b77809b366d6f74532d5af",
"pubkey": "2a31ad2763ec02a3d5dceee4f02c0cc200d856dba83b24708f891f257aa3bd2d",
"created_at": 1738783874,
"kind": 1,
"tags": [
[
"r",
"https://decrypt.co/304595/crypto-stealing-malware-google-apple-apps"
],
[
"subject",
"Researchers Flag Crypto Stealing Malware in Google and Apple Apps"
],
[
"published_at",
"1738783747"
],
[
"image",
"https://cdn.decrypt.co/wp-content/uploads/2020/06/glupteba-malware-bitcoin-blockchain-gID_7.jpg"
],
[
"p",
"2a31ad2763ec02a3d5dceee4f02c0cc200d856dba83b24708f891f257aa3bd2d",
"wss://articles.layer3.news"
],
[
"imeta",
"url https://cdn.decrypt.co/wp-content/uploads/2020/06/glupteba-malware-bitcoin-blockchain-gID_7.jpg"
],
[
"t",
"Technology:perspective"
],
[
"summary",
"The 'SparkCat' campaign uses a malicious software development kit (SDK) embedded in modified messaging apps and other applications to scan users' image galleries for sensitive recovery data. The malware uses Google's ML Kit library to perform optical character recognition (OCR) on images stored on users' devices and transmits matching images to a remote server. The campaign has been discovered in apps available on official and unofficial app marketplaces for Android and iOS devices, and has been installed more than 242,000 times."
]
],
"content": "nostr:nprofile1qyd8wumn8ghj7ctjw35kxmr9wvhxcctev4erxtnwv4mhxqpq9gc66fmrasp284wuamj0qtqvcgqds4km4qajguy03y0j274rh5ks82v5kp\nhttps://cdn.decrypt.co/wp-content/uploads/2020/06/glupteba-malware-bitcoin-blockchain-gID_7.jpg\nThe malware scans users' images for ones that contain wallet recovery phrases. Matching images are then encrypted and transmitted to a remote server.\nhttps://decrypt.co/304595/crypto-stealing-malware-google-apple-apps",
"sig": "f63533a8791c47f55ce36994d3ababb3090a29c8a049fb9634bc5ba98494532db41ea49d01815d92aa5c91e4e4b30414727654380ee58853248552d6fed2b83f"
}