Application and Google discovered that the amount of malware was carried by the application from their respective apps after discovered.
Security Researchers in Kaspersky Malware saysIt was called Sparkcat. It was active in March 2024. Initially, researchers found a malicious framework in a distribution app, which later found the malware in the applicable apps, which later found malware through Google Play Store.
Using the text that is designed to see the text that is known as the text recognition in the user's display (OCR). Researchers include English, Chinese, Japanese and Korea.
The attackers use malware to capture the victim's recovery phrases, and the attackers can completely control the victim's purse and steal their funds.
Researchers say that malware can extract personal information from Screenshots such as messages and passwords.
When Apple received the report from researchers, Apple pulled out the apps of the application last week, and Google said.
“All the applications that can be identified by Google Play and developed developers,” Google spokesman Ed Fernandez told TechCrunch.
Google's spokesman protects Android users to protect Android users to protect their Android users from a well-known Google Play.
Apple did not respond to requests for comment.
Kaspersky spokesman Rosemarie Gonzaleles, a spokeswoman for Technistarie Gonzaleles, is also removed from the applicable applications, but the company's TeleMetry data is also available from other websites and official app stores.