{"id":13153,"date":"2025-02-17T18:45:49","date_gmt":"2025-02-17T15:45:49","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13153"},"modified":"2025-03-04T20:14:18","modified_gmt":"2025-03-04T17:14:18","slug":"ios-android-ocr-stealer-sparkcat","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/","title":{"rendered":"SparkCat truva at\u0131 h\u0131rs\u0131z\u0131 App Store ve Google Play&#8217;e s\u0131zarak foto\u011fraflardan veri \u00e7al\u0131yor"},"content":{"rendered":"<p>Ak\u0131ll\u0131 telefon galeriniz, g\u00fcvenlik veya kolayl\u0131k i\u00e7in; belgeler, banka anla\u015fmalar\u0131 veya kripto para c\u00fczdanlar\u0131n\u0131 kurtarmaya yarayan tohum c\u00fcmleler gibi \u00f6nemli bilgilerin foto\u011fraflar\u0131n\u0131 ve ekran g\u00f6r\u00fcnt\u00fclerini i\u00e7erebilir. T\u00fcm bu veriler, ke\u015ffetti\u011fimiz SparkCat h\u0131rs\u0131z\u0131 gibi k\u00f6t\u00fc niyetli bir uygulama taraf\u0131ndan \u00e7al\u0131nabilir. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u015fu anda kripto c\u00fczdan verilerini \u00e7almak i\u00e7in yap\u0131land\u0131r\u0131lm\u0131\u015ft\u0131r, ancak di\u011fer de\u011ferli bilgileri \u00e7almak i\u00e7in kolayca yeniden kullan\u0131labilir.<\/p>\n<p>\u0130\u015fin en k\u00f6t\u00fc yan\u0131, bu zararl\u0131 yaz\u0131l\u0131m\u0131n resmi uygulama ma\u011fazalar\u0131na da girmi\u015f olmas\u0131 ve vir\u00fcsl\u00fc uygulamalar\u0131n yaln\u0131zca Google Play\u2019den yakla\u015f\u0131k 250.000 kez indirilmi\u015f olmas\u0131. K\u00f6t\u00fc niyetli uygulamalar daha \u00f6nce Google Play\u2019de bulunmu\u015f olsa da, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/?s=google+play\" target=\"_blank\" rel=\"noopener\">App Store\u2019da ilk kez bir h\u0131rs\u0131z Truva at\u0131 tespit edildi<\/a>. Peki bu tehdit nas\u0131l ger\u00e7ekle\u015fiyor ve kendinizi korumak i\u00e7in ne yapabilirsiniz?<\/p>\n<h2>Yasal uygulamalara k\u00f6t\u00fc ama\u00e7l\u0131 eklentiler<\/h2>\n<p>SparkCat\u2019in zararl\u0131 bile\u015fenlerini i\u00e7eren uygulamalar iki kategoriye ayr\u0131l\u0131r: Biri; hepsi ayn\u0131 geli\u015ftiriciye ait olan ve yapay zeka i\u015flevi oldu\u011funu iddia eden benzeri \u00e7ok say\u0131da mesajla\u015fma uygulamas\u0131 gibi a\u00e7\u0131k\u00e7a yem olarak tasarlananlar ve di\u011feri yemek da\u011f\u0131t\u0131m hizmetleri, haber okuyucular\u0131 ve kripto c\u00fczdan yard\u0131mc\u0131 programlar\u0131 gibi yasal uygulamalard\u0131r. Truva at\u0131 i\u015flevinin bu uygulamalara nas\u0131l girdi\u011fini hen\u00fcz bilmiyoruz. Bu durum, uygulamada kullan\u0131lan \u00fc\u00e7\u00fcnc\u00fc taraf bir bile\u015fene bula\u015fm\u0131\u015f olan bir <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-what-are-they-and-how-to-manage-the-risk\/52852\/\" target=\"_blank\" rel=\"noopener nofollow\">tedarik zinciri sald\u0131r\u0131s\u0131n\u0131n sonucu olabilir<\/a>. Geli\u015ftiriciler Truva at\u0131n\u0131 kas\u0131tl\u0131 olarak uygulamalar\u0131na yerle\u015ftirmi\u015f de olabilirler.<\/p>\n<div id=\"attachment_13156\" style=\"width: 1032px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183704\/ios-android-ocr-stealer-sparkcat-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13156\" class=\"size-full wp-image-13156\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183704\/ios-android-ocr-stealer-sparkcat-01.png\" alt=\"SparkCat, ComeCome uygulamas\u0131na hem Google Play hem de App Store'da bula\u015ft\u0131\" width=\"1022\" height=\"1648\"><\/a><p id=\"caption-attachment-13156\" class=\"wp-caption-text\">SparkCat\u2019i tespit etti\u011fimiz ilk uygulama, BAE ve Endonezya\u2019da mevcut olan ComeCome adl\u0131 bir yemek da\u011f\u0131t\u0131m hizmetiydi. Vir\u00fcsl\u00fc uygulama hem Google Play\u2019de hem de App Store\u2019da bulundu.<\/p><\/div>\n<p>H\u0131rs\u0131z, ak\u0131ll\u0131 telefonun galerisindeki foto\u011fraflar\u0131 analiz eder ve bu ama\u00e7la vir\u00fcs bula\u015fm\u0131\u015f t\u00fcm uygulamalar galeriye eri\u015fim izni ister. \u00c7o\u011fu durumda, bu talep tamamen mant\u0131kl\u0131d\u0131r. \u00d6rne\u011fin, yemek da\u011f\u0131t\u0131m uygulamas\u0131 ComeCome, bu sohbeti a\u00e7t\u0131ktan hemen sonra bir m\u00fc\u015fteri destek sohbeti i\u00e7in eri\u015fim talep eder ve bu tamamen do\u011fal g\u00f6r\u00fcn\u00fcr. Di\u011fer uygulamalar, temel i\u015flevlerini ba\u015flat\u0131rken galeri eri\u015fimi talep eder ve bu yine de zarars\u0131z g\u00f6r\u00fcn\u00fcr. Sonu\u00e7ta, Messenger\u2019da foto\u011fraf payla\u015fabilmek istersiniz, de\u011fil mi?<\/p>\n<p>Ancak, kullan\u0131c\u0131 belirli foto\u011fraflara veya t\u00fcm galeriye eri\u015fim izni verir vermez, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ula\u015fabildi\u011fi t\u00fcm foto\u011fraflar\u0131 incelemeye ve de\u011ferli bir \u015fey aramaya ba\u015flar.<\/p>\n<h2>Yapay zeka destekli h\u0131rs\u0131zl\u0131k<\/h2>\n<p>Kedi ve g\u00fcn bat\u0131m\u0131 foto\u011fraflar\u0131 aras\u0131nda kripto c\u00fczdan verilerini bulmak i\u00e7in Truva at\u0131, evrensel bir makine \u00f6\u011frenimi k\u00fct\u00fcphanesi olan Google ML Kit\u2019i temel alan yerle\u015fik bir optik karakter tan\u0131ma (OCR) mod\u00fcl\u00fcne sahiptir.<\/p>\n<p>Cihaz\u0131n dil ayarlar\u0131na ba\u011fl\u0131 olarak SparkCat; Latince, Korece, \u00c7ince veya Japonca olsun, foto\u011fraflardaki ilgili metinleri alg\u0131lamak i\u00e7in e\u011fitilmi\u015f modelleri indirir. Bir g\u00f6r\u00fcnt\u00fcdeki metni tan\u0131d\u0131ktan sonra, Truva at\u0131 bunu komuta ve kontrol sunucusundan y\u00fcklenen bir dizi kuralla kar\u015f\u0131la\u015ft\u0131r\u0131r. Listedeki anahtar kelimelere ek olarak (\u00f6rne\u011fin, \u201cMnemonic\u201d), filtre, yedekleme kodlar\u0131ndaki anlams\u0131z harf kombinasyonlar\u0131 veya tohum c\u00fcmlelerindeki belirli kelime dizileri gibi belirli kal\u0131plar taraf\u0131ndan tetiklenebilir.<\/p>\n<div id=\"attachment_13158\" style=\"width: 1711px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183811\/ios-android-ocr-stealer-sparkcat-02.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13158\" class=\"size-full wp-image-13158\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183811\/ios-android-ocr-stealer-sparkcat-02.png\" alt=\"SparkCat'in arad\u0131\u011f\u0131 anahtar kelimeler\" width=\"1701\" height=\"354\"><\/a><p id=\"caption-attachment-13158\" class=\"wp-caption-text\">Analizimiz s\u0131ras\u0131nda, Trojan\u2019\u0131n C2 sunucular\u0131ndan OCR aramas\u0131 i\u00e7in kullan\u0131lan anahtar kelimelerin bir listesini talep ettik. Siber su\u00e7lular, kripto c\u00fczdanlar\u0131na eri\u015fimi kurtarmak i\u00e7in kullan\u0131lan ve an\u0131msat\u0131c\u0131 olarak bilinen ifadelerle a\u00e7\u0131k\u00e7a ilgileniyor.<\/p><\/div>\n<p>Truva at\u0131, potansiyel olarak de\u011ferli metin i\u00e7eren t\u00fcm foto\u011fraflar\u0131, tan\u0131nan metin ve g\u00f6r\u00fcnt\u00fcn\u00fcn \u00e7al\u0131nd\u0131\u011f\u0131 cihaz hakk\u0131nda ayr\u0131nt\u0131l\u0131 bilgilerle birlikte sald\u0131rganlar\u0131n sunucular\u0131na y\u00fckler.<\/p>\n<h2>Sald\u0131r\u0131n\u0131n boyutu ve kurbanlar\u0131<\/h2>\n<p>Google Play\u2019de 10, App Store\u2019da ise 11 k\u00f6t\u00fc ama\u00e7l\u0131 uygulama tespit ettik. Yay\u0131mland\u0131\u011f\u0131 s\u0131rada, t\u00fcm k\u00f6t\u00fc niyetli uygulamalar ma\u011fazalardan kald\u0131r\u0131lm\u0131\u015ft\u0131. Sadece Google Play\u2019den yap\u0131lan toplam indirme say\u0131s\u0131 analiz s\u0131ras\u0131nda 242.000\u2019i a\u015ft\u0131 ve telemetri verilerimiz ayn\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n di\u011fer sitelerden ve resmi olmayan uygulama ma\u011fazalar\u0131ndan da kullan\u0131labildi\u011fini g\u00f6sterdi.<\/p>\n<div id=\"attachment_13159\" style=\"width: 2645px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183909\/ios-android-ocr-stealer-sparkcat-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13159\" class=\"size-full wp-image-13159\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183909\/ios-android-ocr-stealer-sparkcat-03.png\" alt=\"Google Play ve App Store'da SparkCat bula\u015fm\u0131\u015f uygulamalar\" width=\"2635\" height=\"1900\"><\/a><p id=\"caption-attachment-13159\" class=\"wp-caption-text\">Etkilenen uygulamalar aras\u0131nda hem Google Play hem de App Store\u2019daki pop\u00fcler teslimat hizmetleri ve yapay zeka destekli mesajla\u015fma programlar\u0131 yer al\u0131yor.<\/p><\/div>\n<p>SparkCat\u2019in s\u00f6zl\u00fcklerine bak\u0131l\u0131rsa, bir\u00e7ok Avrupa ve Asya \u00fclkesindeki kullan\u0131c\u0131lardan veri \u00e7almak i\u00e7in \u201ce\u011fitilmi\u015f\u201d. Ayr\u0131ca kan\u0131tlar, sald\u0131r\u0131lar\u0131n en az Mart 2024\u2019ten beri devam etti\u011fini g\u00f6steriyor. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n yazarlar\u0131 muhtemelen ak\u0131c\u0131 bir \u015fekilde \u00c7ince konu\u015fmaktad\u0131r. Bu konuda daha fazla ayr\u0131nt\u0131l\u0131 bilgi ve SparkCat\u2019in teknik y\u00f6nleri <a href=\"https:\/\/securelist.com\/sparkcat-stealer-in-app-store-and-google-play-2\/115385\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019teki kapsaml\u0131 raporda<\/a> bulunabilir.<\/p>\n<h2>Kendinizi OCR Truva atlar\u0131ndan nas\u0131l korursunuz?<\/h2>\n<p>Ne yaz\u0131k ki, \u201cyaln\u0131zca resmi uygulama ma\u011fazalar\u0131ndan y\u00fcksek puanl\u0131 uygulamalar\u0131 indirin\u201d \u015feklindeki eski tavsiye art\u0131k sihirli de\u011fnek de\u011fil. App Store\u2019a bile ger\u00e7ek bir bilgi h\u0131rs\u0131z\u0131 s\u0131zm\u0131\u015f durumda ve benzer olaylar Google Play\u2019de de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/malware-in-google-play-2023\/11856\/\" target=\"_blank\" rel=\"noopener\">defalarca<\/a> ya\u015fand\u0131. Bu nedenle, buradaki kriterleri daha da s\u0131k\u0131la\u015ft\u0131rmam\u0131z gerekiyor: Yaln\u0131zca en az birka\u00e7 ay \u00f6nce yay\u0131nlanm\u0131\u015f, binlerce ya da daha iyisi milyonlarca indirilmi\u015f, y\u00fcksek puanl\u0131 uygulamalar\u0131 indirin. Ayr\u0131ca, sahte olmad\u0131klar\u0131ndan emin olmak i\u00e7in resmi kaynaklardaki (geli\u015ftiricilerin web sitesi gibi) uygulama ba\u011flant\u0131lar\u0131n\u0131 do\u011frulay\u0131n ve yorumlar\u0131 okuyun, \u00f6zellikle de olumsuz olanlar\u0131. Ve elbette, t\u00fcm ak\u0131ll\u0131 telefonlar\u0131n\u0131za ve bilgisayarlar\u0131n\u0131za <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">kapsaml\u0131 bir g\u00fcvenlik sistemi<\/a>\u00a0kurdu\u011funuzdan emin olun.<\/p>\n<div id=\"attachment_13160\" style=\"width: 1060px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183957\/ios-android-ocr-stealer-sparkcat-04.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13160\" class=\"size-full wp-image-13160\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/02\/17183957\/ios-android-ocr-stealer-sparkcat-04.png\" alt=\"App Store'da ComeCome uygulamas\u0131 hakk\u0131ndaki olumsuz yorum\" width=\"1050\" height=\"521\"><\/a><p id=\"caption-attachment-13160\" class=\"wp-caption-text\">ComeCome uygulamas\u0131n\u0131n App Store\u2019daki olumsuz yorumlar\u0131n\u0131 kontrol etmek kullan\u0131c\u0131lar\u0131 uygulamay\u0131 indirmekten vazge\u00e7irmi\u015f olabilir.<\/p><\/div>\n<p>Yeni uygulamalara izin verme konusunda da <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-most-dangerous-features\/11817\/\" target=\"_blank\" rel=\"noopener\">son derece dikkatli<\/a> olmal\u0131s\u0131n\u0131z. Eskiden \u201cEri\u015filebilirlik\u201d ayarlar\u0131 i\u00e7in dikkate al\u0131nmas\u0131 gereken en \u00f6nemli konu buydu ancak art\u0131k \u015fimdi g\u00f6r\u00fcyoruz ki bir galeri eri\u015fimi vermek bile ki\u015fisel verilerin \u00e7al\u0131nmas\u0131na neden olabiliyor. Bir uygulaman\u0131n yasall\u0131\u011f\u0131ndan tam olarak emin de\u011filseniz (\u00f6rne\u011fin, resmi bir mesajla\u015fma program\u0131 de\u011fil, de\u011fi\u015ftirilmi\u015f bir s\u00fcr\u00fcm), t\u00fcm foto\u011fraflar\u0131n\u0131za ve videolar\u0131n\u0131za tam eri\u015fim izni vermeyin. Gerekti\u011finde yaln\u0131zca belirli foto\u011fraflara eri\u015fim izni verin.<\/p>\n<p>Belgeleri, parolalar\u0131, bankac\u0131l\u0131k verilerini veya tohum c\u00fcmlelerinin foto\u011fraflar\u0131n\u0131 ak\u0131ll\u0131 telefonunuzun galerisinde saklamak son derece g\u00fcvensizdir. SparkCat gibi h\u0131rs\u0131zlar\u0131n yan\u0131 s\u0131ra, birisinin foto\u011fraflara g\u00f6z atmas\u0131 veya yanl\u0131\u015fl\u0131kla bir mesajla\u015fma veya dosya payla\u015f\u0131m hizmetine y\u00fcklemeniz riski de her zaman vard\u0131r. Bu t\u00fcr bilgiler \u00f6zel bir uygulamada saklanmal\u0131d\u0131r. \u00d6rne\u011fin <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, yaln\u0131zca parolalar\u0131 ve iki fakt\u00f6rl\u00fc kimlik do\u011frulama belirte\u00e7lerini de\u011fil, ayn\u0131 zamanda banka kart\u0131 ayr\u0131nt\u0131lar\u0131n\u0131 ve taranm\u0131\u015f belgeleri de t\u00fcm cihazlar\u0131n\u0131zda g\u00fcvenli ve \u015fifrelenmi\u015f \u015fekilde saklaman\u0131za ve senkronize etmenize olanak tan\u0131r. Bu arada, bu uygulama <a href=\"https:\/\/www.kaspersky.com.tr\/plus?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0aboneliklerimize dahildir.<\/p>\n<p>Son olarak, vir\u00fcsl\u00fc bir uygulamay\u0131 <strong>zaten<\/strong> y\u00fcklediyseniz (<a href=\"https:\/\/securelist.com\/sparkcat-stealer-in-app-store-and-google-play-2\/115385\/\" target=\"_blank\" rel=\"noopener\">bunlar\u0131n listesi Securelist yaz\u0131s\u0131n\u0131n sonunda bulunabilir<\/a>), silin ve geli\u015ftirici d\u00fczeltilmi\u015f bir s\u00fcr\u00fcm yay\u0131nlayana kadar kullanmay\u0131n. Bu arada, siber su\u00e7lular\u0131n hangi verileri elde etmi\u015f olabilece\u011fini de\u011ferlendirmek i\u00e7in foto\u011fraf galerinizi dikkatlice g\u00f6zden ge\u00e7irin. T\u00fcm parolalar\u0131 de\u011fi\u015ftirin ve galeride kay\u0131tl\u0131 t\u00fcm kartlar\u0131 kullan\u0131ma kapat\u0131n. SparkCat\u2019in ke\u015ffetti\u011fimiz versiyonu \u00f6zellikle tohum c\u00fcmleleri ar\u0131yor olsa da, Truva at\u0131n\u0131n ba\u015fka bilgileri \u00e7almak i\u00e7in yeniden yap\u0131land\u0131r\u0131lmas\u0131 m\u00fcmk\u00fcnd\u00fcr. Kripto c\u00fczdan tohum c\u00fcmlelerine gelince, bunlar bir kez olu\u015fturulduktan sonra de\u011fi\u015ftirilemezler. Yeni bir kripto c\u00fczdan\u0131 olu\u015fturun ve t\u00fcm paran\u0131z\u0131 ele ge\u00e7irilen c\u00fczdandan aktar\u0131n ve sonra onu bir daha hi\u00e7 kullanmay\u0131n.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Resmi Apple ve Google ma\u011fazalar\u0131nda foto\u011fraflar\u0131 analiz ederek kripto para c\u00fczdan\u0131 verilerini \u00e7alan uygulamalar ke\u015ffettik.<\/p>\n","protected":false},"author":2706,"featured_media":13154,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1425,105,14,612,22,2775,750,519,2616,1336,537,1986,1424],"class_list":{"0":"post-13153","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-ai","9":"tag-android","10":"tag-apple","11":"tag-dolandiricilik","12":"tag-google","13":"tag-hirsiz","14":"tag-ios","15":"tag-ipuclari-2","16":"tag-kripto-cuzdani","17":"tag-kripto-para-birimi","18":"tag-tehditler","19":"tag-truva-atlari","20":"tag-yapay-zeka"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-android-ocr-stealer-sparkcat\/28549\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/23785\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/12258\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-android-ocr-stealer-sparkcat\/28661\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/27946\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-android-ocr-stealer-sparkcat\/30756\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-android-ocr-stealer-sparkcat\/29438\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-android-ocr-stealer-sparkcat\/39016\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-android-ocr-stealer-sparkcat\/22580\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-android-ocr-stealer-sparkcat\/23379\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-android-ocr-stealer-sparkcat\/31944\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ios-android-ocr-stealer-sparkcat\/37440\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ios-android-ocr-stealer-sparkcat\/29485\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-android-ocr-stealer-sparkcat\/28790\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-android-ocr-stealer-sparkcat\/34617\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-android-ocr-stealer-sparkcat\/34245\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13153"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13153\/revisions"}],"predecessor-version":[{"id":13183,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13153\/revisions\/13183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13154"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}