Shocking Cyber Scam: 2,600+ Fake Phones Sold with Crypto-Stealing Malware

Hackers have found a new way to steal money. They are selling counterfeit smartphones loaded with hidden malware that can drain people’s cryptocurrency wallets. These fake Android devices, available at discounted prices online, come with a secret built-in virus known as the Triada Trojan.

Fake Phones Sold Online Are Stealing People’s Crypto

Cybersecurity experts from Kaspersky Labs recently discovered that over 2,600 people in different countries have already fallen victim to this scam. Most of the cases have been reported in Russia, and experts believe the number of infected devices could be even higher. Once someone buys and starts using one of these infected phones, hackers can gain almost complete control over the device, stealing sensitive data, including crypto funds.

The Triada Trojan is an advanced type of malware that has been around since 2016. It is designed to hide deep inside a device’s system, making it extremely difficult to detect and remove. The worst part? It infects the phone even before it reaches the buyer, meaning the user doesn’t even have to download anything for their device to be compromised.

How the Malware Works and Why It’s Dangerous

Once the victim starts using the infected phone, the hackers can steal their cryptocurrency in a sneaky way. When the user tries to send money to someone, the malware secretly changes the wallet address. Instead of going to the intended recipient, the funds are sent directly to the hackers.

So far, experts have tracked about $270,000 in stolen cryptocurrency, but the actual number could be much higher. Some of the stolen funds include Monero, a type of digital currency known for being untraceable. This makes it even harder for victims to recover their stolen money.

The malware does more than steal money. It can take user account details also can read and send messages. It can even intercept two-factor authentication codes. This allows hackers to break into accounts without the victim knowing.

Cyberattack Catastrophe: How Hackers Can Endanger Human Lives ?

Where Are These Infected Phones Coming From?

It is still unclear exactly where these compromised phones are being made, but researchers believe hackers have found a way to insert malware into the devices at some point in the supply chain. This means that even the online stores selling these phones might not know they are part of a dangerous scam.

Security experts are warning people to be extremely careful when buying smartphones online. If a deal seems too good to be true, it probably is.  Also, experts recommend installing security software on any new device to check for potential threats.

This shocking scam proves that hackers are constantly finding new ways to trick people and steal their money. As cryptocurrency becomes more popular, cybercriminals are coming up with more advanced ways to take advantage of unsuspecting users.

The best defense against such attacks is awareness. People should always double-check the source of their devices and be cautious when dealing with anything related to online security. Unfortunately, for those who have already been scammed, recovering stolen cryptocurrency is almost impossible, making it all the more important to stay vigilant.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Leaked Documents Uncover Epstein’s Hidden Hand in Ehud Barak’s African Security Missions

Leaked documents have revealed a new layer in the...

Trump’s new money machine — small banks Dominari and Yorkville drive family’s crypto expansion

In the United States, two little-known banks have quietly...

California erupts after GOP sues Newsom over Prop 50 — federal court battle looms just hours after vote

California Governor Gavin Newsom is facing a major legal...

Elon Musk accused of forcing xAI staff to give facial data for ‘flirty’ AI girlfriend chatbot

Elon Musk, the billionaire founder of Tesla, SpaceX, and...

Epstein’s last secret — ex-cellmate Nicholas Tartaglione says feds promised him freedom to turn on Trump

New details have surfaced about Jeffrey Epstein’s final days...

Gavin Newsom’s Prop 50 victory reshapes California politics and boosts his national profile

California Governor Gavin Newsom has secured a major political...

AOC says Trump’s decision to block Greene’s Senate bid fueled her ‘revenge tour’ against GOP

Representative Alexandria Ocasio-Cortez (AOC) has claimed that President Donald...

Zohran Mamdani defeats Andrew Cuomo and Curtis Sliwa to win New York mayoral race

New York City saw a surprising turn of events...

From spy to state leader — Abigail Spanberger’s stunning rise to Virginia’s governor’s mansion

Democrat Abigail Spanberger has been elected as the new...

Inside the Democrats’ secret 2028 race — Pritzker’s casino win, AOC’s rise, and Newsom’s comeback plan

The 2028 U.S. presidential election is still years away,...

Related Articles

Popular Categories

error: Content is protected !!