SERVER : Linux us-phx-web1140.main-hosting.eu 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
IP     : 84.32.84.88
PWD    : /home/u182381751/domains/cryptotokentracker.com/public_html

Name Type Actions
app Directory Rename | Remove
bootstrap Directory Rename | Remove
config Directory Rename | Remove
database Directory Rename | Remove
documentation Directory Rename | Remove
hooks Directory Rename | Remove
public Directory Rename | Remove
resources Directory Rename | Remove
revision-updates Directory Rename | Remove
routes Directory Rename | Remove
sitemap Directory Rename | Remove
storage Directory Rename | Remove
tests Directory Rename | Remove
vendor Directory Rename | Remove
.env File Edit | Rename | Remove
.htaccess File Edit | Rename | Remove
ads.txt File Edit | Rename | Remove
artisan File Edit | Rename | Remove
composer.json File Edit | Rename | Remove
default.php File Edit | Rename | Remove
index.php File Edit | Rename | Remove
qing.php File Edit | Rename | Remove
robots.txt File Edit | Rename | Remove
zj.zip File Edit | Rename | Remove
Hackers are selling counterfeit phones with crypto-stealing malware
Crypto Token Tracker logo Crypto Token Tracker logo
CoinTelegraph 2025-04-03 04:22:00

Hackers are selling counterfeit phones with crypto-stealing malware

Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April 1 statement, but are riddled with a version of the Triada Trojan that infects every process and gives the attackers “almost unlimited control” over the device. Dmitry Kalinin, a cybersecurity expert at Kaspersky Labs, said that once the trojan grants the attackers access to devices, they can steal crypto by replacing wallet addresses . “The authors of the new version of Triada are actively monetizing their efforts; judging by the analysis of transactions, they were able to transfer about $270,000 in various cryptocurrencies to their crypto wallets,” he said. “However, in reality, this amount may be larger; the attackers also targeted Monero, a cryptocurrency that is untraceable.” Among the trojan’s other capabilities are stealing user account information and intercepting incoming and outgoing texts, including two-factor authentication. The trojan penetrates smartphone firmware even before the phone reaches users, and some online sellers might not even be aware of the ticking time bomb in the device , according to Kalinin. “Probably, at one of the stages, the supply chain is compromised, so stores may not even suspect that they are selling smartphones with Triada,” he said. At this stage, Kaspersky researchers say they have found 2,600 confirmed infections through this scam in different countries, with the majority of users in Russia encountering it in the first three months of 2025. The Android devices are sold at reduced prices but are riddled with malware. Source: Hovatek The Triada malware first surfaced in 2016 and is known for targeting financial applications and messaging apps like WhatsApp, Facebook and Google Mail, according to cybersecurity firm Darktrace. It is generally delivered through malicious downloads and phishing campaigns . “The Triada Trojan has been known for a long time, and it still remains one of the most complex and dangerous threats to Android,” Kalinin said. The best way to avoid falling victim to this scam is to only purchase devices from legitimate distributors and install security solutions immediately after purchase, according to Kaspersky Labs. Other firms have also been raising the alarm over new forms of malware targeting crypto users. Related: Crypto exploit, scam losses drop to $28.8M in March after February spike Cybersecurity firm Threat Fabric said in a March 28 report it found a new family of malware that can launch a fake overlay to trick Android users into providing their crypto seed phrases as it takes over the device. On March 18, tech giant Microsoft said it found a new remote access trojan (RAT) that targets crypto held in 20 wallet extensions for the Google Chrome browser. Magazine: Mystery celeb memecoin scam factory, HK firm dumps Bitcoin: Asia Express

Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.