{"id":8332,"date":"2025-02-06T05:48:38","date_gmt":"2025-02-06T05:48:38","guid":{"rendered":"https:\/\/howtogeek.blog\/cs\/?p=8332"},"modified":"2025-02-06T05:48:38","modified_gmt":"2025-02-06T05:48:38","slug":"first-screenshotstealing-malware-discovered-in-apple-app-store","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/cs\/first-screenshotstealing-malware-discovered-in-apple-app-store\/","title":{"rendered":"Prvn\u00ed sn\u00edmek obrazovky \u2013 kr\u00e1de\u017e malwaru objevena v Apple App Store"},"content":{"rendered":"<h2>Odhalen\u00ed SparkCat Malware Breach v App Store spole\u010dnosti Apple<\/h2>\n<p>Apple App Store, kter\u00fd je tradi\u010dn\u011b pova\u017eov\u00e1n za pevnost mobiln\u00ed bezpe\u010dnosti, se ned\u00e1vno stal ob\u011bt\u00ed nov\u00e9ho druhu malwaru zn\u00e1m\u00e9ho jako <strong>SparkCat<\/strong>. Tento alarmuj\u00edc\u00ed objev, kter\u00fd u\u010dinili odborn\u00edci na kybernetickou bezpe\u010dnost ze <a href=\"https:\/\/securelist.com\/sparkcat-stealer-in-app-store-and-google-play\/115385\/.com\" rel=\"noopener noreferrer nofollow\">spole\u010dnosti Kaspersky<\/a>, odhaluje, jak \u0161kodliv\u00e9 aplikace infiltrovaly renomovanou platformu spole\u010dnosti Apple, \u010d\u00edm\u017e se jedn\u00e1 o prvn\u00ed rozpoznan\u00fd p\u0159\u00edpad <strong>malwaru pro \u010dten\u00ed sn\u00edmk\u016f obrazovky, <\/strong> kter\u00fd se dostal do ekosyst\u00e9mu App Store.<\/p>\n<h2>Pochopen\u00ed \u0161kodliv\u00e9ho mechanismu SparkCat<\/h2>\n<p>SparkCat nejen\u017ee pronikl do App Store, ale byl tak\u00e9 spat\u0159en na Google Play Store, kde zneu\u017e\u00edv\u00e1 knihovnu fotografi\u00ed u\u017eivatele. Tyto kompromitovan\u00e9 aplikace, kter\u00e9 se \u010dasto maskuj\u00ed jako ne\u0161kodn\u00e9 don\u00e1\u0161ky j\u00eddla nebo chatovac\u00ed rozhran\u00ed um\u011bl\u00e9 inteligence, po\u017eaduj\u00ed p\u0159\u00edstup k fotografi\u00edm na za\u0159\u00edzen\u00ed u\u017eivatele. S ud\u011blen\u00fdm povolen\u00edm vyu\u017e\u00edv\u00e1 malware k extrahov\u00e1n\u00ed textu z obr\u00e1zk\u016f n\u00e1stroj pro optick\u00e9 rozpozn\u00e1v\u00e1n\u00ed znak\u016f (OCR), kter\u00fd vyu\u017e\u00edv\u00e1 knihovnu Google ML Kit.<\/p>\n<p>Jeho prim\u00e1rn\u00ed c\u00edl? Sn\u00edmky obrazovky, kter\u00e9 obsahuj\u00ed <strong>fr\u00e1ze pro obnovu kryptom\u011bnov\u00e9 pen\u011b\u017eenky<\/strong>. T\u00edm to v\u0161ak nekon\u010d\u00ed; citliv\u00e9 informace, jako jsou hesla a osobn\u00ed zpr\u00e1vy, mohou b\u00fdt tak\u00e9 ukradeny. Po identifikaci relevantn\u00edho textu malware tajn\u011b odes\u00edl\u00e1 tyto obr\u00e1zky na servery pod kontrolou kyberzlo\u010dinc\u016f, \u010d\u00edm\u017e jim poskytuje potenci\u00e1ln\u00ed p\u0159\u00edstup k kryptom\u011bnov\u00fdm pen\u011b\u017eenk\u00e1m ob\u011bt\u00ed a umo\u017e\u0148uje kr\u00e1de\u017ee finan\u010dn\u00edch prost\u0159edk\u016f.<\/p>\n<h2>\u0160\u00ed\u0159en\u00ed a dopad SparkCat<\/h2>\n<p>Podle Kaspersky je kampa\u0148 SparkCat aktivn\u00ed od b\u0159ezna 2024, p\u0159i\u010dem\u017e infikovan\u00e9 aplikace na Google Play nashrom\u00e1\u017edily p\u0159es <strong>242 000 sta\u017een\u00ed<\/strong>. P\u0159esto\u017ee p\u0159esn\u00fd po\u010det posti\u017een\u00fdch u\u017eivatel\u016f iPhone z\u016fst\u00e1v\u00e1 nezn\u00e1m\u00fd, d\u016fsledky jsou zna\u010dn\u00e9 vzhledem k historick\u00e9 pov\u011bsti App Store v oblasti bezpe\u010dnosti u\u017eivatel\u016f.<\/p>\n<h3>Identifikovan\u00e9 infikovan\u00e9 aplikace<\/h3>\n<p>Mezi aplikacemi, kter\u00e9 se pova\u017euj\u00ed za infikovan\u00e9, jsou:<\/p>\n<ul>\n<li><strong>ComeCome<\/strong> \u2013 rozvoz j\u00eddel<\/li>\n<li><strong>ChatAi<\/strong> \u2013 obl\u00edben\u00e1 chatovac\u00ed aplikace AI<\/li>\n<li><strong>WeTink<\/strong> \u2013 dal\u0161\u00ed chatovac\u00ed rozhran\u00ed AI<\/li>\n<li><strong>AnyGPT<\/strong> \u2013 rychl\u00fd \u00fasp\u011bch v interakc\u00edch \u0159\u00edzen\u00fdch um\u011blou inteligenc\u00ed<\/li>\n<\/ul>\n<p>Je znepokojiv\u00e9, \u017ee od t\u00e9to zpr\u00e1vy z\u016fst\u00e1vaj\u00ed n\u011bkter\u00e9 z t\u011bchto \u0161kodliv\u00fdch aplikac\u00ed dostupn\u00e9 v App Store i Google Play. Spole\u010dnost Kaspersky nazna\u010duje, \u017ee v\u00fdvoj\u00e1\u0159i si nemus\u00ed b\u00fdt v\u011bdomi p\u0159\u00edtomnosti malwaru, co\u017e nazna\u010duje mo\u017en\u00e9 zranitelnosti dodavatelsk\u00e9ho \u0159et\u011bzce nebo z\u00e1m\u011brn\u00fd \u0161kodliv\u00fd software.<\/p>\n<h2>Doporu\u010den\u00ed pro u\u017eivatele: Z\u016fsta\u0148te v bezpe\u010d\u00ed<\/h2>\n<p>Spole\u010dnost Kaspersky vyz\u00fdv\u00e1 u\u017eivatele, aby okam\u017eit\u011b zas\u00e1hli a odinstalovali kteroukoli ze zm\u00edn\u011bn\u00fdch aplikac\u00ed ze sv\u00fdch za\u0159\u00edzen\u00ed \u2013 jak z iPhon\u016f, tak z telefon\u016f Android. Aby se zv\u00fd\u0161ila bezpe\u010dnost proti budouc\u00edm hrozb\u00e1m, obhajuj\u00ed p\u0159\u00edsn\u00e1 preventivn\u00ed opat\u0159en\u00ed, konkr\u00e9tn\u011b odrazuj\u00ed od praxe ukl\u00e1d\u00e1n\u00ed citliv\u00fdch informac\u00ed, zejm\u00e9na <strong>fr\u00e1z\u00ed pro obnovu kryptom\u011bny<\/strong>, jako sn\u00edmk\u016f obrazovky na chytr\u00fdch telefonech. Tento incident podtrhuje, \u017ee i ty nejbezpe\u010dn\u011bj\u0161\u00ed platformy mohou skr\u00fdvat nebezpe\u010d\u00ed; u\u017eivatel\u00e9 proto mus\u00ed z\u016fstat ostra\u017eit\u00ed p\u0159i stahov\u00e1n\u00ed nov\u00fdch aplikac\u00ed bez ohledu na pov\u011bst obchodu.<\/p>\n<h2>\u010casto kladen\u00e9 ot\u00e1zky<\/h2>\n<h3><strong>1. Co je malware SparkCat?<\/strong><\/h3>\n<p>Malware SparkCat je nov\u00fd typ \u0161kodliv\u00e9ho softwaru, kter\u00fd se zam\u011b\u0159uje na u\u017eivatele Apple App Store a Google Play Store, speci\u00e1ln\u011b navr\u017een\u00fd ke kr\u00e1de\u017ei citliv\u00fdch informac\u00ed prost\u0159ednictv\u00edm sn\u00edmk\u016f obrazovky, zejm\u00e9na se zam\u011b\u0159en\u00edm na fr\u00e1ze pro obnovu kryptom\u011bnov\u00e9 pen\u011b\u017eenky.<\/p>\n<h3><strong>2. Jak SparkCat infikuje mobiln\u00ed za\u0159\u00edzen\u00ed?<\/strong><\/h3>\n<p>SparkCat infikuje za\u0159\u00edzen\u00ed t\u00edm, \u017ee se vlo\u017e\u00ed do zd\u00e1nliv\u011b legitimn\u00edch aplikac\u00ed, kter\u00e9 po\u017eaduj\u00ed p\u0159\u00edstup ke knihovn\u00e1m fotografi\u00ed u\u017eivatel\u016f. Po instalaci vyhled\u00e1v\u00e1 citliv\u00fd text v obr\u00e1zc\u00edch a odes\u00edl\u00e1 tato data kyberzlo\u010dinc\u016fm.<\/p>\n<h3><strong>3. Jak\u00e9 kroky m\u00e1m podniknout, pokud m\u00e1m infikovanou aplikaci?<\/strong><\/h3>\n<p>Pokud m\u00e1te podez\u0159en\u00ed, \u017ee m\u00e1te aplikaci infikovanou SparkCat, okam\u017eit\u011b ji odinstalujte ze za\u0159\u00edzen\u00ed a vyhn\u011bte se ukl\u00e1d\u00e1n\u00ed citliv\u00fdch informac\u00ed, jako jsou fr\u00e1ze pro obnoven\u00ed, jako sn\u00edmky obrazovky. Pro v\u011bt\u0161\u00ed bezpe\u010dnost pravideln\u011b kontrolujte opr\u00e1vn\u011bn\u00ed aplikac\u00ed nainstalovan\u00fdch ve va\u0161em za\u0159\u00edzen\u00ed.<\/p>\n<p><a class=\"xiaomi\" href=\"https:\/\/nerdschalk.com\/first-screenshot-stealing-malware-sneaks-onto-apples-app-store\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Zdroj a obr\u00e1zky<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Odhalen\u00ed SparkCat Malware Breach v App Store spole\u010dnosti Apple Apple App Store, kter\u00fd je tradi\u010dn\u011b pova\u017eov\u00e1n za pevnost mobiln\u00ed bezpe\u010dnosti, se ned\u00e1vno stal ob\u011bt\u00ed nov\u00e9ho druhu malwaru zn\u00e1m\u00e9ho jako SparkCat. Tento alarmuj\u00edc\u00ed objev, kter\u00fd u\u010dinili odborn\u00edci na kybernetickou bezpe\u010dnost ze spole\u010dnosti Kaspersky, odhaluje, jak \u0161kodliv\u00e9 aplikace infiltrovaly renomovanou platformu spole\u010dnosti Apple, \u010d\u00edm\u017e se jedn\u00e1 o [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[32,9],"class_list":["post-8332","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-apple","tag-iphone"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/comments?post=8332"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8332\/revisions"}],"predecessor-version":[{"id":8333,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8332\/revisions\/8333"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/media?parent=8332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/categories?post=8332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/tags?post=8332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}