Shocking Cyber Scam: 2,600+ Fake Phones Sold with Crypto-Stealing Malware

Hackers have found a new way to steal money. They are selling counterfeit smartphones loaded with hidden malware that can drain people’s cryptocurrency wallets. These fake Android devices, available at discounted prices online, come with a secret built-in virus known as the Triada Trojan.

Fake Phones Sold Online Are Stealing People’s Crypto

Cybersecurity experts from Kaspersky Labs recently discovered that over 2,600 people in different countries have already fallen victim to this scam. Most of the cases have been reported in Russia, and experts believe the number of infected devices could be even higher. Once someone buys and starts using one of these infected phones, hackers can gain almost complete control over the device, stealing sensitive data, including crypto funds.

The Triada Trojan is an advanced type of malware that has been around since 2016. It is designed to hide deep inside a device’s system, making it extremely difficult to detect and remove. The worst part? It infects the phone even before it reaches the buyer, meaning the user doesn’t even have to download anything for their device to be compromised.

How the Malware Works and Why It’s Dangerous

Once the victim starts using the infected phone, the hackers can steal their cryptocurrency in a sneaky way. When the user tries to send money to someone, the malware secretly changes the wallet address. Instead of going to the intended recipient, the funds are sent directly to the hackers.

So far, experts have tracked about $270,000 in stolen cryptocurrency, but the actual number could be much higher. Some of the stolen funds include Monero, a type of digital currency known for being untraceable. This makes it even harder for victims to recover their stolen money.

The malware does more than steal money. It can take user account details also can read and send messages. It can even intercept two-factor authentication codes. This allows hackers to break into accounts without the victim knowing.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

Where Are These Infected Phones Coming From?

It is still unclear exactly where these compromised phones are being made, but researchers believe hackers have found a way to insert malware into the devices at some point in the supply chain. This means that even the online stores selling these phones might not know they are part of a dangerous scam.

Security experts are warning people to be extremely careful when buying smartphones online. If a deal seems too good to be true, it probably is.  Also, experts recommend installing security software on any new device to check for potential threats.

This shocking scam proves that hackers are constantly finding new ways to trick people and steal their money. As cryptocurrency becomes more popular, cybercriminals are coming up with more advanced ways to take advantage of unsuspecting users.

The best defense against such attacks is awareness. People should always double-check the source of their devices and be cautious when dealing with anything related to online security. Unfortunately, for those who have already been scammed, recovering stolen cryptocurrency is almost impossible, making it all the more important to stay vigilant.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Leaked emails expose Epstein’s secret hand in Israel–Mongolia security pact with Barak

A new set of leaked emails shows Jeffrey Epstein...

Award stage turns battlefield as Harris brands Trump an unchecked, incompetent and unhinged President

Kamala Harris, the former vice president and 2024 Democratic...

Newsom office doubles down on fascist label for Miller citing his political actions and views

Newsom’s Office Takes a Bold Stance California Governor Gavin Newsom’s...

The privacy-first app that just blew past 350,000 new users a day

Explosive Growth Surprises Users Arattai, the messaging app developed by...

Federal firepower hits AOC’s Queens district as FBI targets Roosevelt Avenue crime empire

The FBI has moved into action in Queens, New...

Book bombshell: Harris says Newsom never called back after dismissive ‘Hiking’ message

Former Vice President Kamala Harris is making headlines again,...

South Korea reels from wave of cyberattacks — nearly 1 million personal records stolen in 2025

Cyberattacks on South Korea’s state agencies have reached alarming...

Kristi Noem Accused of Rushing Millions to Florida Pier Near Rumored Lover’s Home

Homeland Security Secretary Kristi Noem faces serious questions. A...

Ian Calderon moves to address cost of living crisis in bid to succeed Gavin Newsom as governor

A Millennial Candidate Steps Forward Former California State Assembly Majority...

Harrods Issues Urgent Warning After Customer Data Stolen in IT Breach

Personal details exposed in breach at third-party system Luxury department...

Newsom office doubles down on fascist label for Miller citing his political actions and views

Newsom’s Office Takes a Bold Stance California Governor Gavin Newsom’s...

The privacy-first app that just blew past 350,000 new users a day

Explosive Growth Surprises Users Arattai, the messaging app developed by...

Book bombshell: Harris says Newsom never called back after dismissive ‘Hiking’ message

Former Vice President Kamala Harris is making headlines again,...

South Korea reels from wave of cyberattacks — nearly 1 million personal records stolen in 2025

Cyberattacks on South Korea’s state agencies have reached alarming...

Kristi Noem Accused of Rushing Millions to Florida Pier Near Rumored Lover’s Home

Homeland Security Secretary Kristi Noem faces serious questions. A...

Related Articles

Popular Categories

error: Content is protected !!