<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kaspersky Mobile Solutions — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kaspersky-mobile-solutions/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 12:02:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kaspersky-mobile-solutions/feed.xml" rel="self" type="application/rss+xml"/><item><title>Q1 2026 Mobile Threat Landscape: SparkCat and Triada Updates</title><link>https://feed.craftedsignal.io/briefs/2026-05-mobile-threats/</link><pubDate>Mon, 18 May 2026 12:02:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mobile-threats/</guid><description>The Q1 2026 mobile threat landscape saw a decrease in overall attack volume driven by reduced adware and RiskTool detections, while the number of unique users targeted remained stable, with new SparkCat variants on app stores and increased banking Trojan and Triada backdoor activity.</description><content:encoded><![CDATA[<p>The mobile threat landscape in Q1 2026 showed a decrease in overall attack volume compared to the previous quarter, primarily due to a reduction in adware and RiskTool detections. Despite this decrease, the number of unique users targeted by these threats remained relatively stable, indicating that the risk to individual mobile users has not diminished. Notably, researchers discovered new versions of the SparkCat crypto stealer on both Google Play and the App Store. The quarter also saw threat actors increasing their production of new banking Trojans, particularly Mamont variants, and the pre-installed Triada.ag backdoor rose to the top spot in malware detections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Distribution:</strong> Attackers upload malicious applications containing the SparkCat crypto stealer to official app stores like Google Play and the App Store.</li>
<li><strong>Installation:</strong> Users download and install the infected applications onto their Android or iOS devices.</li>
<li><strong>Obfuscation:</strong> SparkCat employs code obfuscation techniques to conceal its malicious Rust library within the infected Android apps.</li>
<li><strong>Decryption:</strong> The malware decrypts the obfuscated malicious Rust library using a custom-built Dalvik-like virtual machine.</li>
<li><strong>Credential Theft:</strong> SparkCat steals cryptocurrency wallet credentials from the compromised device.</li>
<li><strong>OCR Exploitation:</strong> The iOS version of SparkCat leverages Apple&rsquo;s proprietary Vision framework for optical character recognition (OCR) to extract credentials or sensitive data from images.</li>
<li><strong>Data Exfiltration:</strong> The stolen credentials and data are exfiltrated to attacker-controlled servers.</li>
<li><strong>Monetization:</strong> Attackers use the stolen cryptocurrency wallet credentials to access and steal cryptocurrency from the victim&rsquo;s wallets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>In Q1 2026, over 2.67 million attacks utilizing malware, adware, or unwanted mobile software were prevented. The rise of banking Trojans and crypto stealers like SparkCat can lead to significant financial losses for victims. Pre-installed backdoors such as Triada.ag affect a wide range of devices due to their presence in device firmware, impacting user privacy and device security. The top malware category was Trojan-Banker with 10.86% of total detections.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor application installations for suspicious behaviors, specifically those attempting to use OCR or other system frameworks in unexpected ways. Deploy the Sigma rule detecting OCR framework usage to identify potential SparkCat infections.</li>
<li>Implement detections for applications using custom Dalvik-like virtual machines to decrypt code. Deploy the provided process creation Sigma rule to identify potentially malicious processes.</li>
<li>Educate users to only install applications from trusted sources and to be cautious of applications requesting excessive permissions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>mobile</category><category>malware</category><category>trojan</category><category>cryptostealer</category><category>sparkcat</category><category>triada</category><category>android</category><category>ios</category></item></channel></rss>