Close Menu
  • Home
  • AI
    • Web3
    • Gaming
  • Bitcoin
    • CBDCs
    • DeFi
    • Ethereum
    • Layer2
    • Macro
    • Memecoins
    • NFT
    • NFTs
    • Stablecoins
  • Banking
    • Bankruptcy
    • Censorship
    • Crime
  • Policies
    • Regulation
    • Legal
    • Exchanges
    • Privacy
  • All Posts
What's Hot

Cryptocurrency Has Become Trump’s Second-Most Profitable Revenue Stream

Jun. 18, 2025

CoinShares Solana ETF Adds to the Expanding Collection of Applications for Altcoin-Based Funds

Jun. 18, 2025

Implications for USDC Reserves in the Event of Circle’s Bankruptcy

Jun. 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Coin Forge HubCoin Forge Hub
Subscribe
  • Home
  • AI
    • Web3
    • Gaming
  • Bitcoin
    • CBDCs
    • DeFi
    • Ethereum
    • Layer2
    • Macro
    • Memecoins
    • NFT
    • NFTs
    • Stablecoins
  • Banking
    • Bankruptcy
    • Censorship
    • Crime
  • Policies
    • Regulation
    • Legal
    • Exchanges
    • Privacy
  • All Posts
Coin Forge HubCoin Forge Hub
Home » Typography Elements » Kaspersky Reports Hackers Installing Crypto-Stealing Malware on Counterfeit Android Phones
Bitcoin

Kaspersky Reports Hackers Installing Crypto-Stealing Malware on Counterfeit Android Phones

By adminApr. 12, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Kaspersky Reports Hackers Installing Crypto-Stealing Malware on Counterfeit Android Phones
Kaspersky Reports Hackers Installing Crypto-Stealing Malware on Counterfeit Android Phones
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

That cheap smartphone may look like a steal—and it could well be, but not in the way you were hoping.

Cheap counterfeit phones are now being sold preloaded with malware that targets unsuspecting Android users—stealing cryptocurrency, replacing phone numbers during calls, and hijacking their social media accounts.

Cybersecurity company Kaspersky reported the novel technique for spreading the dangerous Triada trojan in a recent analysis. Since its discovery in 2016, Triada has evolved into one of the most complex and dangerous Android threats as it is able to infiltrate every process on the smartphones.

In its latest iteration, hackers have deeply implanted the malware in the system framework of counterfeit smartphones, making it extremely difficult to detect and remove.

“Probably, at one of the stages, the supply chain is compromised, so stores may not even suspect that they are selling smartphones with Triada,” said Dmitry Kalinin, a cybersecurity expert at Kaspersky Lab.

Between March 13 and 27, 2025, over 2,600 users encountered the Trojan, with the malware giving attackers “almost unlimited control” over their smartphones, according to the report.

The malware can steal user credentials from messaging apps like Telegram and TikTok, replace crypto wallet addresses, and even hijack the victim’s communications by sending messages on their behalf.

As Kaspersky notes, this is likely just the tip of the iceberg, as the attackers continue to exploit these devices for financial gain.

What is the Triada trojan?

Triada first emerged in 2016 and has since become one of the most sophisticated mobile malware threats targeting Android users.

The modular Trojan gains root access to infected devices, allowing it to inject malicious code into system processes like Zygote, which controls the launch of all apps on Android.

This makes Triada extremely hard to detect, as it operates largely in the device’s RAM and often hides from conventional security checks.

The latest report said Triada also monitors web browser activity, replaces links, and can interfere with anti-fraud systems by blocking network connections.

One of Triada’s most disturbing features is its ability to silently change phone numbers during calls, enabling the attacker to intercept sensitive conversations.

The rising threat of mobile malware

Triada’s resurgence follows the recent emergence of other mobile malware strains, such as Crocodilus, which specifically targets crypto users.

Crocodilus uses social engineering tactics to steal wallet seed phrases by masquerading as legitimate apps.

Once installed, it can remotely control the infected device, allowing cybercriminals to siphon off sensitive data.

Kaspersky recommends keeping devices updated, installing trusted antivirus software, and avoiding apps from unknown sources to safeguard against these threats.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleEY Enhances Nightfall with Zero-Knowledge Technology for Confidential Ethereum Transactions
Next Article Ethereum Price Rises After Tariff Reversal and Stronger-Than-Expected Inflation Report

Related Posts

Trump Strategist Explains How Bitcoin Contributed to the Republicans’ Victory in the 2024 Election

Jun. 18, 2025

Roman Storm of Tornado Cash Warns: “If I Lose, DeFi Will Perish With Me” Just Weeks Ahead of Trial

Jun. 18, 2025

Hyperliquid Token Drives Altcoin Recovery as Bitcoin Stabilizes

Jun. 17, 2025
Leave A Reply Cancel Reply

Latest Posts

Cryptocurrency Has Become Trump’s Second-Most Profitable Revenue Stream

Jun. 18, 2025

CoinShares Solana ETF Adds to the Expanding Collection of Applications for Altcoin-Based Funds

Jun. 18, 2025

Implications for USDC Reserves in the Event of Circle’s Bankruptcy

Jun. 18, 2025

Trump Strategist Explains How Bitcoin Contributed to the Republicans’ Victory in the 2024 Election

Jun. 18, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss

Every Bitcoin Holder Will Eventually Become an Internationalist

By adminAug. 15, 1971

Over the weekend, BTC surged back towards the 30-day moving average, hovering around 69k. The opport…

Brave Souls Take the Lead in the Bitcoin Time Tunnel with OKX Web3

May. 22, 2010

The Ultimate Power Play: Masters and Minions in the World of Positions

Jul. 6, 2010
About Us
About Us

Explore the latest developments in cryptocurrency and blockchain technology with comprehensive and timely coverage, in-depth analysis, and expert insights from Coin Forge Hub.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Cryptocurrency Has Become Trump’s Second-Most Profitable Revenue Stream

Jun. 18, 2025

CoinShares Solana ETF Adds to the Expanding Collection of Applications for Altcoin-Based Funds

Jun. 18, 2025

Implications for USDC Reserves in the Event of Circle’s Bankruptcy

Jun. 18, 2025
Most Popular

Every Bitcoin Holder Will Eventually Become an Internationalist

Aug. 15, 1971

Brave Souls Take the Lead in the Bitcoin Time Tunnel with OKX Web3

May. 22, 2010

The Ultimate Power Play: Masters and Minions in the World of Positions

Jul. 6, 2010
© 2025 Coin Forge Hub All rights reserved.
  • Home
  • AI
    • Web3
    • Gaming
  • Bitcoin
    • CBDCs
    • DeFi
    • Ethereum
    • Layer2
    • Macro
    • Memecoins
    • NFT
    • NFTs
    • Stablecoins
  • Banking
    • Bankruptcy
    • Censorship
    • Crime
  • Policies
    • Regulation
    • Legal
    • Exchanges
    • Privacy
  • All Posts

Type above and press Enter to search. Press Esc to cancel.