While the attack vector is common, the insidious nature of the malicious code makes it unique.

It targets and steals crypto wallet security codes using OCR to scan images for mnemonic passphrases.

A sophisticated new strain of Android malware has emerged from Korea.

New Android malware uses OCR to steal crypto wallet keys from images

It targets cryptocurrency wallets by exploiting users' mnemonic keys.

SpyAgent disguises itself as legitimate apps, ranging from banking and government services to streaming platforms and utility software.

So far, McAfee has identified over 280 of these fake applications.

It then harvests text messages, contact lists, and stored images from the infected rig.

SpyAgent has also proved to be wily with its efforts to avoid detection.

The malware’s creators have proven adept at expanding SpyAgent’s reach.

It initially targeted users in Korea.

However, the malware recently spread to the United Kingdom.

It has clever techniques to avoid detection from security researchers, including string encoding and function renaming.

SpyAgent makes its way onto victims' devices largely through phishing campaigns.

Attackers use social engineering tactics to lure victims into clicking malicious links.

These links direct users to convincing fake websites that prompt downloading the malware-laden APK file.

The campaigns are proving particularly successful when combined with stolen contact data.

SpyAgent’s backend operations are very sophisticated, as the malware’s scale indicates.

For instance, researchers discovered admin pages designed for managing compromised devices.

Another indication of its sophistication is how quickly it developed legs.

The first sighting of SpyAgent was only earlier this year and only in Korea.

It has already spread to UK users.

However, its creators continue refining their techniques, and McAfee believes they are currently developing an iOS version.