{"id":8155,"date":"2025-02-06T05:49:41","date_gmt":"2025-02-06T05:49:41","guid":{"rendered":"https:\/\/howtogeek.blog\/lv\/?p=8155"},"modified":"2025-02-06T05:49:41","modified_gmt":"2025-02-06T05:49:41","slug":"first-screenshotstealing-malware-discovered-in-apple-app-store","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/lv\/first-screenshotstealing-malware-discovered-in-apple-app-store\/","title":{"rendered":"Pirmais ekr\u0101nuz\u0146\u0113mums ar \u013caunpr\u0101t\u012bgu programmat\u016bru, kas atkl\u0101ta Apple App Store"},"content":{"rendered":"<h2>SparkCat \u013caunpr\u0101t\u012bgas programmat\u016bras p\u0101rk\u0101puma atkl\u0101\u0161ana Apple App Store<\/h2>\n<p>Tradicion\u0101li uzskat\u012bts par mobil\u0101s dro\u0161\u012bbas cietoksni, Apple App Store nesen ir k\u013cuvis par upuri jauna veida \u013caunpr\u0101t\u012bgai programmat\u016brai, kas paz\u012bstama k\u0101 <strong>SparkCat<\/strong>.\u0160is satrauco\u0161ais atkl\u0101jums, ko veica <a href=\"https:\/\/securelist.com\/sparkcat-stealer-in-app-store-and-google-play\/115385\/.com\" rel=\"noopener noreferrer nofollow\">Kaspersky<\/a> kiberdro\u0161\u012bbas eksperti, atkl\u0101j, k\u0101 \u013caunpr\u0101t\u012bgas lietojumprogrammas ir iek\u013cuvu\u0161as Apple slavenaj\u0101 platform\u0101, padarot \u0161o par pirmo atpaz\u012bto gad\u012bjumu, kad <strong>ekr\u0101nuz\u0146\u0113mumu nolas\u012b\u0161anas \u013caunprogrammat\u016bra<\/strong> non\u0101k App Store ekosist\u0113m\u0101.<\/p>\n<h2>Izpratne par SparkCat \u013caunpr\u0101t\u012bgo meh\u0101nismu<\/h2>\n<p>SparkCat ir ne tikai iefiltr\u0113jies App Store, bet ar\u012b ir paman\u012bts Google Play veikal\u0101, kur tas izmanto lietot\u0101ja fotoatt\u0113lu bibliot\u0113ku.\u0160\u012bs apdraud\u0113t\u0101s lietojumprogrammas, kas bie\u017ei tiek mask\u0113tas k\u0101 nekait\u012bgi p\u0101rtikas pieg\u0101des pakalpojumi vai m\u0101ksl\u012bg\u0101 intelekta t\u0113rz\u0113\u0161anas saskarnes, pieprasa piek\u013cuvi fotoatt\u0113liem lietot\u0101ja ier\u012bc\u0113. Ja ir pie\u0161\u0137irta at\u013cauja, \u013caunprogrammat\u016bra izmanto optisko rakstz\u012bmju atpaz\u012b\u0161anas (OCR) r\u012bku, izmantojot Google ML komplekta bibliot\u0113ku, lai izvilktu tekstu no att\u0113liem.<\/p>\n<p>T\u0101s galvenais m\u0113r\u0137is? Ekr\u0101nuz\u0146\u0113mumi, kas satur <strong>kriptoval\u016btas maka atkop\u0161anas fr\u0101zes<\/strong>. Tom\u0113r tas neapst\u0101jas ar to; var tikt nozagta ar\u012b sensit\u012bva inform\u0101cija, piem\u0113ram, paroles un personisk\u0101s zi\u0146as. Identific\u0113jot attiec\u012bgo tekstu, \u013caunprogrammat\u016bra slepeni nos\u016bta \u0161os att\u0113lus uz serveriem, kas atrodas kibernoziedznieku kontrol\u0113, nodro\u0161inot tiem potenci\u0101lu piek\u013cuvi upuru kriptoval\u016btas makiem un pie\u013caujot l\u012bdzek\u013cu z\u0101dz\u012bbu.<\/p>\n<h2>SparkCat izplat\u012bba un ietekme<\/h2>\n<p>Saska\u0146\u0101 ar Kaspersky teikto, SparkCat kampa\u0146a ir bijusi akt\u012bva kop\u0161 2024.gada marta, un infic\u0113t\u0101s lietotnes pakalpojum\u0101 Google Play ir uzkr\u0101ju\u0161as vair\u0101k nek\u0101 <strong>242 000 lejupiel\u0101\u017eu<\/strong>. Lai gan prec\u012bzs ietekm\u0113to iPhone lietot\u0101ju skaits joproj\u0101m nav noteikts, ietekme ir noz\u012bm\u012bga, \u0146emot v\u0113r\u0101 App Store v\u0113sturisko reput\u0101ciju lietot\u0101ju dro\u0161\u012bbas jom\u0101.<\/p>\n<h3>Identific\u0113tas infic\u0113t\u0101s lietojumprogrammas<\/h3>\n<p>Starp lietotn\u0113m, kuras tiek uzskat\u012btas par infic\u0113t\u0101m, ir \u0161\u0101das:<\/p>\n<ul>\n<li><strong>ComeCome<\/strong> \u2013 \u0113dienu pieg\u0101des pakalpojums<\/li>\n<li><strong>ChatAi<\/strong> \u2013 popul\u0101ra AI t\u0113rz\u0113\u0161anas lietojumprogramma<\/li>\n<li><strong>WeTink<\/strong> \u2013 v\u0113l viens AI t\u0113rz\u0113\u0161anas interfeiss<\/li>\n<li><strong>AnyGPT<\/strong> \u2014 nep\u0101rsp\u0113jami pan\u0101kumi AI vad\u012bt\u0101 mijiedarb\u012bb\u0101<\/li>\n<\/ul>\n<p>Satrauco\u0161i, ka kop\u0161 \u0161\u012b zi\u0146ojuma da\u017eas no \u0161\u012bm \u013caunpr\u0101t\u012bgaj\u0101m lietotn\u0113m joproj\u0101m ir pieejamas gan pakalpojum\u0101 App Store, gan pakalpojum\u0101 Google Play. Kaspersky nor\u0101da, ka izstr\u0101d\u0101t\u0101ji var\u0113tu nezin\u0101t par \u013caunpr\u0101t\u012bgas programmat\u016bras kl\u0101tb\u016btni, nor\u0101dot uz iesp\u0113jam\u0101m pieg\u0101des \u0137\u0113des ievainojam\u012bb\u0101m vai apzin\u0101tu \u013caunpr\u0101t\u012bbu.<\/p>\n<h2>Ieteikumi lietot\u0101jiem: saglab\u0101jiet dro\u0161\u012bbu<\/h2>\n<p>Kaspersky aicina lietot\u0101jus nekav\u0113joties r\u012bkoties, atinstal\u0113jot jebkuru no min\u0113taj\u0101m lietotn\u0113m no sav\u0101m ier\u012bc\u0113m \u2014 gan iPhone, gan Android t\u0101lru\u0146iem. Lai uzlabotu dro\u0161\u012bbu pret n\u0101kotnes apdraud\u0113jumiem, vi\u0146i atbalsta stingrus piesardz\u012bbas pas\u0101kumus, \u012bpa\u0161i atturot praksi saglab\u0101t sensit\u012bvu inform\u0101ciju, jo \u012bpa\u0161i <strong>kriptoval\u016btas atkop\u0161anas fr\u0101zes<\/strong>, k\u0101 ekr\u0101nuz\u0146\u0113mumus viedt\u0101lru\u0146os.\u0160is incidents uzsver, ka pat visdro\u0161\u0101kaj\u0101s platform\u0101s var b\u016bt briesmas; t\u0101p\u0113c lietot\u0101jiem ir j\u0101saglab\u0101 modr\u012bba, lejupiel\u0101d\u0113jot jaunas lietojumprogrammas, neatkar\u012bgi no veikala reput\u0101cijas.<\/p>\n<h2>Bie\u017ei uzdotie jaut\u0101jumi<\/h2>\n<h3><strong>1. Kas ir SparkCat \u013caunpr\u0101t\u012bga programmat\u016bra?<\/strong><\/h3>\n<p>SparkCat \u013caunprogrammat\u016bra ir jauna veida \u013caunpr\u0101t\u012bga programmat\u016bra, kas ir v\u0113rsta uz Apple App Store un Google Play veikala lietot\u0101jiem, \u012bpa\u0161i izstr\u0101d\u0101ta, lai nozagtu sensit\u012bvu inform\u0101ciju, izmantojot ekr\u0101nuz\u0146\u0113mumus, \u012bpa\u0161i koncentr\u0113joties uz kriptoval\u016btas maka atkop\u0161anas fr\u0101z\u0113m.<\/p>\n<h3><strong>2. K\u0101 SparkCat infic\u0113 mobil\u0101s ier\u012bces?<\/strong><\/h3>\n<p>SparkCat infic\u0113 ier\u012bces, iegulstot sevi \u0161\u0137ietami likum\u012bg\u0101s lietojumprogramm\u0101s, kas pieprasa piek\u013cuvi lietot\u0101ju fotoatt\u0113lu bibliot\u0113k\u0101m. P\u0113c instal\u0113\u0161anas t\u0101 sken\u0113 sensit\u012bvu tekstu att\u0113los un nos\u016bta \u0161os datus kibernoziedzniekiem.<\/p>\n<h3><strong>3. K\u0101das darb\u012bbas man j\u0101veic, ja man ir infic\u0113ta lietotne?<\/strong><\/h3>\n<p>Ja jums ir aizdomas, ka k\u0101da lietotne ir infic\u0113ta ar SparkCat, nekav\u0113joties atinstal\u0113jiet to no ier\u012bces un izvairieties no sensit\u012bvas inform\u0101cijas, piem\u0113ram, atkop\u0161anas fr\u0101\u017eu, k\u0101 ekr\u0101nuz\u0146\u0113mumu glab\u0101\u0161anas. Papildu dro\u0161\u012bbai regul\u0101ri p\u0101rskatiet ier\u012bc\u0113 instal\u0113to lietot\u0146u at\u013caujas.<\/p>\n<p><a class=\"xiaomi\" href=\"https:\/\/nerdschalk.com\/first-screenshot-stealing-malware-sneaks-onto-apples-app-store\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Avots un att\u0113li<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SparkCat \u013caunpr\u0101t\u012bgas programmat\u016bras p\u0101rk\u0101puma atkl\u0101\u0161ana Apple App Store Tradicion\u0101li uzskat\u012bts par mobil\u0101s dro\u0161\u012bbas cietoksni, Apple App Store nesen ir k\u013cuvis par upuri jauna veida \u013caunpr\u0101t\u012bgai programmat\u016brai, kas paz\u012bstama k\u0101 SparkCat.\u0160is satrauco\u0161ais atkl\u0101jums, ko veica Kaspersky kiberdro\u0161\u012bbas eksperti, atkl\u0101j, k\u0101 \u013caunpr\u0101t\u012bgas lietojumprogrammas ir iek\u013cuvu\u0161as Apple slavenaj\u0101 platform\u0101, padarot \u0161o par pirmo atpaz\u012bto gad\u012bjumu, kad ekr\u0101nuz\u0146\u0113mumu nolas\u012b\u0161anas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[47,6],"class_list":["post-8155","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-apple","tag-iphone"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/comments?post=8155"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8155\/revisions"}],"predecessor-version":[{"id":8156,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8155\/revisions\/8156"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/media?parent=8155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/categories?post=8155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/tags?post=8155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}