Nicegram is a target for stealer malware. Swiftgram is not affected. Explaining.
Kaspersky found a "
SparkCat trojan" that scans photos and steals valuable information like Crypto wallet phrases and Passwords.
Trojan targets AI-messaging apps. It can start working as soon as you will Allow Access to Photos for the app.
While I don’t like a lot of things in current Nicegram, and these news are a perfect opportunity to advertise Swiftgram, I must be clear and honest.
Below are pure facts.Researchers found that hacker expected the malware to be injected in Nicegram (bundle id app.nicegram) and activated as soon as you open any Chat and give Photos permissions, which is typical when you want to share a photo with somebody (
TelegramUI.ChatControllerImpl).
There're couple of ways to inject the malware:
1. App developers do it on purpose
2. So known "supply-chain attack", when App depends (or App's dependency depends) on the infected library, without App developers knowing about that.
3. A bad actor who injects it to .ipa file
👀 Since Nicegram is
not open-source,
we can't fully verify it's security. Unlike Swiftgram, which is entirely Open SourceRough analysis of Nicegram 1.9.5 (430), downloaded from App Store
:1. I found no traces of SparkCat in HTTP traffic.
2. I found no traces of SparkCat in
decoded .ipaHow to protect yourself, if you're unsure?1. Disable Photos Access in iOS Settings > (Apps >) Nicegram
or
Completely remove the app
2. Avoid storing screenshots with sensitive information. Use Password Manager, for example iOS Passwords.
3. Avoid installing apps from untrusted sources, that may inject various frameworks.
As for today,
there is no official .ipa
of Swiftgram.