Did your phone just steal your seed phrase


You know that moment when you play a song for your friends, and they’re like “ehh… it’s okay, I guess?” – but a week later they’re humming it under their breath, and next thing you know it’s on their gym playlist?

Yeah. This I knew you’d come around feeling is undefeated.

Listening to music

And it’s kind of how it feels watching US states slowly start understanding Bitcoin.

The newest state to officially hit play: Texas.

Governor Greg Abbott signed off on a bill to add Bitcoin to the state’s strategic reserves.

So now Texas joins Arizona and New Hampshire in the SBR club.

And who else is tapping their foot to the Bitcoin beat?

Well, a bunch of state Bitcoin reserve proposals have flopped.

But there are still a few holding on in the queue:

  • Massachusetts;

  • Michigan;

  • Ohio;

  • Rhode Island;

  • And North Carolina.

No guarantees – but keep your headphones charged just in case.

Divider

😾 Bad cat

Pop quiz time: there’s this thing called SparkKitty. Purely based on vibes, what do you think it is?

A) A cursed version of the Nyan Cat

B) The latest toy every iPad kid wants

C) A furry Twitch streamer

Got your guess?

Too bad. It was a trick question. It’s D) None of the above.

Kid eating apple

SparkKitty is actually a malware recently discovered by the cybersecurity firm Kaspersky.

And no, it’s not cute.

It hides inside fake or modified apps (like TikTok mods, casino games, or crypto apps), and it’s been found on both Android and iOS.

SparkKitty hiding from us

On iPhones:

It hides inside fake versions of legit developer tools like AFNetworking or Alamofire – normally used to help apps connect to the internet. Attackers modify them to launch malware as soon as the app opens.

And to get around Apple’s App Store checks, they use something called an Enterprise profile – a system meant for companies to test apps on employee phones. It lets apps be installed directly, without Apple’s usual security reviews.

On Android, the malware shows up in two main ways:

👉 Some versions are fake or modified apps with malicious code written in Java or Kotlin;

👉 Others use a tool called Xposed, which lets the malware hide inside real apps and mess with what they do – without changing how they look.

Mom, come pick me up, I'm scared

Once installed, the malware:

  • Pretends to be a support chat or similar feature, then asks for access to your photo gallery;

  • Scans your photos for sensitive text like crypto seed phrases;

  • Sends those photos (and device info) straight to the attackers’ command server.

Basically, if you’ve ever taken a screenshot of your crypto wallet recovery phrase… you’d be cooked.

Shocked kid sipping a milkshake

And yeah, we’ve talked about stuff like this many times before. But until people stop getting scammed, we’re not shutting up.

So, here’s how to protect yourself:

1/ Only download from official app stores

Stick to Google Play and the Apple App Store.

And even then, don’t let your guard down – always check reviews and verify the developer.

2/ Don’t keep sensitive info in your photo gallery

No screenshots of seed phrases. No private keys. No “temporary” backups.

3/ Deny gallery access unless it makes sense

If an app that has nothing to do with photos asks for gallery access – say no.

But above all:

If your phone is where you manage your crypto, then it’s your wallet.

And just like you wouldn’t let a random stranger near your actual wallet, you shouldn’t let some sketchy app do that either.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *